CVE-2023-0957
moderate-risk
Published 2023-03-03
An issue was discovered in Gitpod versions prior to release-2022.11.2.16. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to the Gitpod JSONRPC server using a victim’s credentials, because the Origin header is not restricted. This can lead to the extraction of data from workspaces, to a full takeover of the workspace.
Do I need to act?
-
0.44% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.2/10
High
NETWORK
/ HIGH complexity
Affected Products (1)
Gitpod
Affected Vendors
References (14)
Issue Tracking
https://github.com/gitpod-io/gitpod/pull/16378
Issue Tracking
https://github.com/gitpod-io/gitpod/pull/16405
Third Party Advisory
https://snyk.io/blog/gitpod-remote-code-execution-vulnerability-websockets/
Issue Tracking
https://github.com/gitpod-io/gitpod/pull/16378
Issue Tracking
https://github.com/gitpod-io/gitpod/pull/16405
Third Party Advisory
https://snyk.io/blog/gitpod-remote-code-execution-vulnerability-websockets/
31
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal