Lucene search

K
cve[email protected]CVE-2024-5258
HistoryMay 23, 2024 - 11:15 a.m.

CVE-2024-5258

2024-05-2311:15:24
CWE-639
web.nvd.nist.gov
500
gitlab
authorization
vulnerability
cve-2024-5258
pipeline
bypass

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "versions": [
      {
        "version": "16.10",
        "status": "affected",
        "lessThan": "16.10.6",
        "versionType": "semver"
      },
      {
        "version": "16.11",
        "status": "affected",
        "lessThan": "16.11.3",
        "versionType": "semver"
      },
      {
        "version": "17.0",
        "status": "affected",
        "lessThan": "17.0.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%