{"vulnerability": "CVE-2024-12431", "sightings": [{"uuid": "615ffa01-194d-465d-bb2a-46a020293973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12431", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113794654216478642", "content": "", "creation_timestamp": "2025-01-08T20:37:06.251407Z"}, {"uuid": "2898ce4c-9b01-475a-853a-2f5f52f5bc67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12431", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113793610252558322", "content": "", "creation_timestamp": "2025-01-08T16:11:36.203775Z"}, {"uuid": "d8a86b73-86bd-4a32-941b-7c6096439423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12431", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfb3ifhorh2i", "content": "", "creation_timestamp": "2025-01-08T21:15:34.823327Z"}, {"uuid": "bc62d877-718e-4134-8d33-ec60e9684d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12431", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfb5czoh4p2b", "content": "", "creation_timestamp": "2025-01-08T21:48:22.073546Z"}, {"uuid": "9c78b19a-677b-41d1-90c9-71a0c9d1e42c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12431", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12431\n\ud83d\udd39 Description: An issue was discovered in GitLab CE/EE affecting all versions starting from 15.5 before 17.5.5, 17.6 before 17.6.3, and 17.7 before 17.7.1, in which unauthorized users could manipulate the status of issues in public projects.\n\ud83d\udccf Published: 2025-01-08T20:30:42.896Z\n\ud83d\udccf Modified: 2025-01-08T20:30:42.896Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/508742\n2. https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/#unauthorized-user-can-manipulate-status-of-issues-in-public-projects\n3. https://hackerone.com/reports/2877710", "creation_timestamp": "2025-01-08T21:14:36.000000Z"}, {"uuid": "73e525c1-0916-425e-a54a-1d5cd79c6562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12431", "type": "seen", "source": "https://t.me/cvedetector/14742", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12431 - GitLab Unauthorized Issue Status Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-12431 \nPublished : Jan. 8, 2025, 9:15 p.m. | 36\u00a0minutes ago \nDescription : An issue was discovered in GitLab CE/EE affecting all versions starting from 15.5 before 17.5.5, 17.6 before 17.6.3, and 17.7 before 17.7.1, in which unauthorized users could manipulate the status of issues in public projects. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T23:21:27.000000Z"}]}