An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
No PoCs from references.
- https://github.com/0xMarcio/cve
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/EmmanuelCruzL/CVE-2023-2825
- https://github.com/GhostTroops/TOP
- https://github.com/Occamsec/CVE-2023-2825
- https://github.com/Rubikcuv5/CVE-2023-2825
- https://github.com/Threekiii/CVE
- https://github.com/Tornad0007/CVE-2023-2825-Gitlab
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/alej6/MassCyberCenter-Mentorship-Project-
- https://github.com/azarin-bayali/Code-Academy-Diploma-Project
- https://github.com/caopengyan/CVE-2023-2825
- https://github.com/cc3305/CVE-2023-2825
- https://github.com/hheeyywweellccoommee/CVE-2023-2825-zaskh
- https://github.com/hktalent/TOP
- https://github.com/johe123qwe/github-trending
- https://github.com/mikuyaQAQ/23NBugRange
- https://github.com/nomi-sec/PoC-in-GitHub