Lucene search

K
vulnrichmentGitLabVULNRICHMENT:CVE-2024-2177
HistoryJul 09, 2024 - 1:30 p.m.

CVE-2024-2177 Improper Restriction of Rendered UI Layers or Frames in GitLab

2024-07-0913:30:57
CWE-1021
GitLab
github.com
4
gitlab
cross window forgery
oauth authentication

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A Cross Window Forgery vulnerability exists within GitLab CE/EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*"
    ],
    "vendor": "gitlab",
    "product": "gitlab",
    "versions": [
      {
        "status": "affected",
        "version": "16.3.0",
        "lessThan": "16.11.5",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:community:*:*:*"
    ],
    "vendor": "gitlab",
    "product": "gitlab",
    "versions": [
      {
        "status": "affected",
        "version": "16.3.0",
        "lessThan": "16.11.5",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:17.0.0:*:*:*:enterprise:*:*:*"
    ],
    "vendor": "gitlab",
    "product": "gitlab",
    "versions": [
      {
        "status": "affected",
        "version": "17.0.0",
        "lessThan": "17.0.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:17.0.0:*:*:*:community:*:*:*"
    ],
    "vendor": "gitlab",
    "product": "gitlab",
    "versions": [
      {
        "status": "affected",
        "version": "17.0.0",
        "lessThan": "17.0.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*"
    ],
    "vendor": "gitlab",
    "product": "gitlab",
    "versions": [
      {
        "status": "affected",
        "version": "17.1.0",
        "lessThan": "17.1.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*"
    ],
    "vendor": "gitlab",
    "product": "gitlab",
    "versions": [
      {
        "status": "affected",
        "version": "17.1.0",
        "lessThan": "17.1.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total