GitLab 14.1 < 15.6.8 / 15.7 < 15.7.7 / 15.8 < 15.8.2 (CVE-2023-22490)

medium Nessus Plugin ID 171884


The GitLab instance installed on the remote host is affected by vulnerability.


The version of GitLab installed on the remote host is between 14.1 to 15.6.8, prior to 15.7.7, prior to 15.8.2. It is, therefore, affected by a vulnerability as referenced in the CRITICAL-SECURITY-RELEASE-GITLAB-15-8-2-RELEASED advisory.

- A attacker can create a specially crafted repository, forcing Git into using a specific local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links, the objects directory itself can itself be a symbolic link, allowing access outside the git repository with the authority of the git user. (CVE-2023-22490)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to GitLab version 15.6.8, 15.7.7, 15.8.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 171884

File Name: gitlab_CVE-2023-22490.nasl

Version: 1.1

Type: combined

Agent: unix

Family: CGI abuses

Published: 2/24/2023

Updated: 2/27/2023

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-22490


Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:gitlab:gitlab

Required KB Items: installed_sw/GitLab

Exploit Ease: No known exploits are available

Patch Publication Date: 2/14/2023

Vulnerability Publication Date: 2/14/2023

Reference Information

CVE: CVE-2023-22490