Lucene search

K
cvelistGitLabCVELIST:CVE-2024-6678
HistorySep 12, 2024 - 6:26 p.m.

CVE-2024-6678 Authentication Bypass by Spoofing in GitLab

2024-09-1218:26:33
CWE-290
GitLab
www.cve.org
11
gitlab
authentication bypass
cve-2024-6678
pipeline trigger

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

40.7%

An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
    ],
    "versions": [
      {
        "version": "8.14",
        "status": "affected",
        "lessThan": "17.1.7",
        "versionType": "semver"
      },
      {
        "version": "17.2",
        "status": "affected",
        "lessThan": "17.2.5",
        "versionType": "semver"
      },
      {
        "version": "17.3",
        "status": "affected",
        "lessThan": "17.3.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

40.7%