4.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
4.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.1%
An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.
[
{
"vendor": "GitLab",
"product": "GitLab",
"repo": "git://[email protected]:gitlab-org/gitlab.git",
"versions": [
{
"version": "16.10",
"status": "affected",
"lessThan": "16.10.6",
"versionType": "semver"
},
{
"version": "16.11",
"status": "affected",
"lessThan": "16.11.3",
"versionType": "semver"
},
{
"version": "17.0",
"status": "affected",
"lessThan": "17.0.1",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
4.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
4.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.1%