GitLab, the popular web-based DevOps lifecycle platform, is urging its users to
apply a newly released security patch after discovering a high-severity path
traversal vulnerability.
apply a newly released security patch after discovering a high-severity path
traversal vulnerability.
The flaw, tagged as CVE-2023-2825
[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2825], holds maximum
severity status (CVSS score of 10.0) due to its potential impact. It affects
version 16.0.0 of both the GitLab Community Edition (CE) and the Enterprise
Edition (EE).
A cybersecurity researcher called ‘pw