Lucene search

K
cvelistGitLabCVELIST:CVE-2024-5258
HistoryMay 23, 2024 - 11:02 a.m.

CVE-2024-5258 Authorization Bypass Through User-Controlled Key in GitLab

2024-05-2311:02:06
CWE-639
GitLab
www.cve.org
2
gitlab
authorization bypass
cve-2024-5258
naming convention
pipeline logic

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

4.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "versions": [
      {
        "version": "16.10",
        "status": "affected",
        "lessThan": "16.10.6",
        "versionType": "semver"
      },
      {
        "version": "16.11",
        "status": "affected",
        "lessThan": "16.11.3",
        "versionType": "semver"
      },
      {
        "version": "17.0",
        "status": "affected",
        "lessThan": "17.0.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

4.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-5258