{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"GitLab Enterprise Edition (EE) versions 16.6.x ant\u00e9rieures \u00e0 16.6.2","product":{"name":"N/A","vendor":{"name":"GitLab","scada":false}}},{"description":"GitLab Community Edition (CE) versions 16.5.x ant\u00e9rieures \u00e0 16.5.4","product":{"name":"N/A","vendor":{"name":"GitLab","scada":false}}},{"description":"GitLab Community Edition (CE) versions 16.6.x ant\u00e9rieures \u00e0 16.6.2","product":{"name":"N/A","vendor":{"name":"GitLab","scada":false}}},{"description":"GitLab Enterprise Edition (EE) versions 16.4.x ant\u00e9rieures \u00e0 16.4.4","product":{"name":"N/A","vendor":{"name":"GitLab","scada":false}}},{"description":"GitLab Enterprise Edition (EE) versions 16.5.x ant\u00e9rieures \u00e0 16.5.4","product":{"name":"N/A","vendor":{"name":"GitLab","scada":false}}},{"description":"GitLab Community Edition (CE) versions 16.4.x ant\u00e9rieures \u00e0 16.4.4","product":{"name":"N/A","vendor":{"name":"GitLab","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-6051","url":"https://www.cve.org/CVERecord?id=CVE-2023-6051"},{"name":"CVE-2023-3907","url":"https://www.cve.org/CVERecord?id=CVE-2023-3907"},{"name":"CVE-2023-5061","url":"https://www.cve.org/CVERecord?id=CVE-2023-5061"},{"name":"CVE-2023-5512","url":"https://www.cve.org/CVERecord?id=CVE-2023-5512"},{"name":"CVE-2023-3904","url":"https://www.cve.org/CVERecord?id=CVE-2023-3904"},{"name":"CVE-2023-6680","url":"https://www.cve.org/CVERecord?id=CVE-2023-6680"},{"name":"CVE-2023-6564","url":"https://www.cve.org/CVERecord?id=CVE-2023-6564"},{"name":"CVE-2023-3511","url":"https://www.cve.org/CVERecord?id=CVE-2023-3511"}],"links":[],"reference":"CERTFR-2023-AVI-1027","revisions":[{"description":"Version initiale","revision_date":"2023-12-14T00:00:00.000000"},{"description":"Correction coquille.","revision_date":"2023-12-15T00:00:00.000000"}],"risks":[{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans <span\nclass=\"textit\">GitLab</span>. Certaines d'entre elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es, une\n\u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans GitLab","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 GitLab security-release-gitlab-16-6-2-released du 13 d\u00e9cembre 2023","url":"https://about.gitlab.com/releases/2023/12/13/security-release-gitlab-16-6-2-released/"}]}
