A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately.
Published 2024-01-04 10:15:12
Updated 2024-02-04 20:15:47
Source Red Hat, Inc.
View at NVD,   CVE.org

Products affected by CVE-2023-6944

Exploit prediction scoring system (EPSS) score for CVE-2023-6944

0.14%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 36 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-6944

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
5.7
MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
2.1
3.6
NIST 2024-01-10
7.3
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
2.1
5.2
Red Hat, Inc. 2024-01-04
5.7
MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
2.1
3.6
Red Hat, Inc. 2024-01-25
7.3
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
N/A
N/A
RedHat-CVE-2023-6944

CWE ids for CVE-2023-6944

References for CVE-2023-6944

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!