CVE Vulnerabilities

CVE-2023-1555

Not Using Password Aging

Published: Sep 01, 2023 | Modified: Nov 21, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API.

Weakness

The product does not have a mechanism in place for managing password aging.

Affected Software

NameVendorStart VersionEnd Version
GitlabGitlab15.2.0 (including)16.1.5 (excluding)
GitlabGitlab16.2 (including)16.2.5 (excluding)
GitlabGitlab16.3.0 (including)16.3.0 (including)
GitlabUbuntubionic*
GitlabUbuntuesm-apps/xenial*
GitlabUbuntutrusty*
GitlabUbuntuxenial*

Extended Description

Password aging (or password rotation) is a policy that forces users to change their passwords after a defined time period passes, such as every 30 or 90 days. Without mechanisms such as aging, users might not change their passwords in a timely manner. Note that while password aging was once considered an important security feature, it has since fallen out of favor by many, because it is not as effective against modern threats compared to other mechanisms such as slow hashes. In addition, forcing frequent changes can unintentionally encourage users to select less-secure passwords. However, password aging is still in use due to factors such as compliance requirements, e.g., Payment Card Industry Data Security Standard (PCI DSS).

Potential Mitigations

References