7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
7 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.3%
An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload in an old feature branch to perform malicious actions.
[
{
"vendor": "GitLab",
"product": "GitLab",
"repo": "git://[email protected]:gitlab-org/gitlab.git",
"versions": [
{
"version": "11.3",
"status": "affected",
"lessThan": "16.7.7",
"versionType": "semver"
},
{
"version": "16.8",
"status": "affected",
"lessThan": "16.8.4",
"versionType": "semver"
},
{
"version": "16.9",
"status": "affected",
"lessThan": "16.9.2",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
7 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.3%