{"uuid": "d22dea05-357b-46aa-b799-1f063dee35c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6944", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15515", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-6944\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately.\n\ud83d\udccf Published: 2024-01-04T10:02:38.088Z\n\ud83d\udccf Modified: 2025-05-08T11:58:46.250Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2023-6944\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2255204", "creation_timestamp": "2025-05-08T12:24:11.000000Z"}