Lucene search

K
cvelistGitLabCVELIST:CVE-2024-1525
HistoryFeb 21, 2024 - 11:30 p.m.

CVE-2024-1525 Improper Access Control in GitLab

2024-02-2123:30:44
CWE-284
GitLab
www.cve.org
cve-2024-1525
gitlab
access control
ldap
password reset

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

5.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.1%

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "versions": [
      {
        "version": "16.1",
        "status": "affected",
        "lessThan": "16.7.6",
        "versionType": "semver"
      },
      {
        "version": "16.8",
        "status": "affected",
        "lessThan": "16.8.3",
        "versionType": "semver"
      },
      {
        "version": "16.9",
        "status": "affected",
        "lessThan": "16.9.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

5.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.1%