Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2024-2130
Vulnerability from csaf_certbund
Published
2024-09-11 22:00
Modified
2024-09-15 22:00
Summary
GitLab CE/EE: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
GitLab ist eine Webanwendung zur Versionsverwaltung für Softwareprojekte auf Basis von git.
Angriff
Ein Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, Daten zu manipulieren, beliebigen Code auszuführen, erhöhte Rechte zu erlangen und einen Denial-of-Service-Zustand zu erzeugen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "GitLab ist eine Webanwendung zur Versionsverwaltung f\u00fcr Softwareprojekte auf Basis von git.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren, beliebigen Code auszuf\u00fchren, erh\u00f6hte Rechte zu erlangen und einen Denial-of-Service-Zustand zu erzeugen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2130 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2130.json" }, { "category": "self", "summary": "WID-SEC-2024-2130 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2130" }, { "category": "external", "summary": "GitLab Critical Patch Release vom 2024-09-11", "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "source_lang": "en-US", "title": "GitLab CE/EE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-09-15T22:00:00.000+00:00", "generator": { "date": "2024-09-16T08:04:05.143+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-2130", "initial_release_date": "2024-09-11T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c17.3.2", "product": { "name": "Open Source GitLab \u003c17.3.2", "product_id": "T037552" } }, { "category": "product_version", "name": "17.3.2", "product": { "name": "Open Source GitLab 17.3.2", "product_id": "T037552-fixed", "product_identification_helper": { "cpe": "cpe:/a:gitlab:gitlab:17.3.2" } } }, { "category": "product_version_range", "name": "\u003c17.2.5", "product": { "name": "Open Source GitLab \u003c17.2.5", "product_id": "T037553" } }, { "category": "product_version", "name": "17.2.5", "product": { "name": "Open Source GitLab 17.2.5", "product_id": "T037553-fixed", "product_identification_helper": { "cpe": "cpe:/a:gitlab:gitlab:17.2.5" } } }, { "category": "product_version_range", "name": "\u003c17.1.7", "product": { "name": "Open Source GitLab \u003c17.1.7", "product_id": "T037554" } }, { "category": "product_version", "name": "17.1.7", "product": { "name": "Open Source GitLab 17.1.7", "product_id": "T037554-fixed", "product_identification_helper": { "cpe": "cpe:/a:gitlab:gitlab:17.1.7" } } } ], "category": "product_name", "name": "GitLab" } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-4472", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in GitLab CE/EE. Dieser Fehler besteht aufgrund der unsachgem\u00e4\u00dfen Handhabung sensibler Informationen, bei der die Anmeldedaten des Abh\u00e4ngigkeits-Proxys im Klartext in GraphQL-Protokollen geloggt werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-4472" }, { "cve": "CVE-2024-6678", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf eine unzureichende Validierung von Pipeline-Triggern zur\u00fcckzuf\u00fchren, wodurch eine Pipeline als ein beliebiger Benutzer ausgel\u00f6st werden kann, und auf eine unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung von Berechtigungen, wodurch ein Gastbenutzer mit der benutzerdefinierten Rolle \u201eAdmin Group Member\u201c Zugriff auf andere Rollen erhalten kann. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um sich erweiterte Rechte zu verschaffen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-6678" }, { "cve": "CVE-2024-8631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf eine unzureichende Validierung von Pipeline-Triggern zur\u00fcckzuf\u00fchren, wodurch eine Pipeline als ein beliebiger Benutzer ausgel\u00f6st werden kann, und auf eine unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung von Berechtigungen, wodurch ein Gastbenutzer mit der benutzerdefinierten Rolle \u201eAdmin Group Member\u201c Zugriff auf andere Rollen erhalten kann. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um sich erweiterte Rechte zu verschaffen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8631" }, { "cve": "CVE-2024-2743", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf mehrere Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Zugriffskontrolle und Fehlerbehandlung sowie unzureichende Einschr\u00e4nkungen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen wie sensible Projektinformationen, Anmeldedaten oder Konfigurationsdetails offenzulegen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-2743" }, { "cve": "CVE-2024-4660", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf mehrere Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Zugriffskontrolle und Fehlerbehandlung sowie unzureichende Einschr\u00e4nkungen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen wie sensible Projektinformationen, Anmeldedaten oder Konfigurationsdetails offenzulegen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-4660" }, { "cve": "CVE-2024-5435", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf mehrere Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Zugriffskontrolle und Fehlerbehandlung sowie unzureichende Einschr\u00e4nkungen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen wie sensible Projektinformationen, Anmeldedaten oder Konfigurationsdetails offenzulegen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-5435" }, { "cve": "CVE-2024-6389", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf mehrere Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Zugriffskontrolle und Fehlerbehandlung sowie unzureichende Einschr\u00e4nkungen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen wie sensible Projektinformationen, Anmeldedaten oder Konfigurationsdetails offenzulegen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-6389" }, { "cve": "CVE-2024-6685", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in GitLab CE/EE. Diese Fehler sind auf mehrere Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Zugriffskontrolle und Fehlerbehandlung sowie unzureichende Einschr\u00e4nkungen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen wie sensible Projektinformationen, Anmeldedaten oder Konfigurationsdetails offenzulegen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-6685" }, { "cve": "CVE-2024-8640", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in GitLab EE. Dieser Fehler betrifft die Product Analytics Funnel YAML-Komponente aufgrund einer unvollst\u00e4ndigen Eingabefilterung, was zu Code-Injektion f\u00fchrt. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8640" }, { "cve": "CVE-2024-8635", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in GitLab EE. Dieser Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen URL-Validierung, die die Verwendung einer benutzerdefinierten Maven Dependency Proxy-URL erm\u00f6glicht, um Anfragen an interne Ressourcen zu senden, was zu einer serverseitigen Anfragef\u00e4lschung f\u00fchrt. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8635" }, { "cve": "CVE-2024-8641", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in GitLab CE/EE. Durch unsachgem\u00e4\u00dfe Sitzungsverwaltung kann ein Angreifer mit dem CI_JOB_TOKEN eines Opfers ein GitLab-Sitzungs-Token erhalten, das dem Opfer geh\u00f6rt. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um die Sitzung des Opfers zu manipulieren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8641" }, { "cve": "CVE-2024-4283", "notes": [ { "category": "description", "text": "In GitLab EE bestehen mehrere Schwachstellen. Diese Fehler sind auf die unsachgem\u00e4\u00dfe Durchsetzung des Schutzes vor dem \u00dcberschreiben von Variablen zur\u00fcckzuf\u00fchren, was zu einer unbefugten \u00c4nderung von Pipeline-Variablen f\u00fchrt, sowie auf Probleme mit offenen Umleitungen, die eine \u00dcbernahme von Konten erm\u00f6glichen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-4283" }, { "cve": "CVE-2024-4612", "notes": [ { "category": "description", "text": "In GitLab EE bestehen mehrere Schwachstellen. Diese Fehler sind auf die unsachgem\u00e4\u00dfe Durchsetzung des Schutzes vor dem \u00dcberschreiben von Variablen zur\u00fcckzuf\u00fchren, was zu einer unbefugten \u00c4nderung von Pipeline-Variablen f\u00fchrt, sowie auf Probleme mit offenen Umleitungen, die eine \u00dcbernahme von Konten erm\u00f6glichen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-4612" }, { "cve": "CVE-2024-8311", "notes": [ { "category": "description", "text": "In GitLab EE bestehen mehrere Schwachstellen. Diese Fehler sind auf die unsachgem\u00e4\u00dfe Durchsetzung des Schutzes vor dem \u00dcberschreiben von Variablen zur\u00fcckzuf\u00fchren, was zu einer unbefugten \u00c4nderung von Pipeline-Variablen f\u00fchrt, sowie auf Probleme mit offenen Umleitungen, die eine \u00dcbernahme von Konten erm\u00f6glichen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8311" }, { "cve": "CVE-2024-8754", "notes": [ { "category": "description", "text": "In GitLab EE bestehen mehrere Schwachstellen. Diese Fehler sind auf die unsachgem\u00e4\u00dfe Durchsetzung des Schutzes vor dem \u00dcberschreiben von Variablen zur\u00fcckzuf\u00fchren, was zu einer unbefugten \u00c4nderung von Pipeline-Variablen f\u00fchrt, sowie auf Probleme mit offenen Umleitungen, die eine \u00dcbernahme von Konten erm\u00f6glichen. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8754" }, { "cve": "CVE-2024-6446", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in GitLab CE/EE. Die Schwachstelle ist auf eine unzureichende Validierung von Weiterleitungs-URLs zur\u00fcckzuf\u00fchren. Eine manipulierte URL kann ein Opfer dazu verleiten, einer vom Angreifer kontrollierten Anwendung zu vertrauen. Ein entfernt authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um den Benutzer zu t\u00e4uschen. Eine erfolgreiche Ausnutzung erfordert Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-6446" }, { "cve": "CVE-2024-8124", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in GitLab CE/EE, die auf unsachgem\u00e4\u00dfe Beschr\u00e4nkungen der Eingabegr\u00f6\u00dfe zur\u00fcckzuf\u00fchren ist. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er einen gro\u00dfen glm_source-Parameter sendet." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00", "title": "CVE-2024-8124" }, { "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in GitLab EE/CE. Aufgrund einer unzureichenden Eingabevalidierung kann ein Angreifer beliebige, nicht beanspruchte Anbieteridentit\u00e4ten zuordnen und die Kontrolle \u00fcber Konten erlangen, wenn eine JWT-Authentifizierung konfiguriert ist. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um sich erweiterte Rechte zu verschaffen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T037554", "T037552", "T037553" ] }, "release_date": "2024-09-11T22:00:00.000+00:00" } ] }
CVE-2024-5435 (GCVE-0-2024-5435)
Vulnerability from cvelistv5
Published
2024-09-12 16:56
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/464044 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2520722 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:25:05.825878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:25:39.541Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:35.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "15.10", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [gudanggaramfilter](https://hackerone.com/gudanggaramfilter) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209: Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:56:58.445Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #464044", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464044" }, { "name": "HackerOne Bug Bounty Report #2520722", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2520722" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above." } ], "title": "Generation of Error Message Containing Sensitive Information in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-5435", "datePublished": "2024-09-12T16:56:58.445Z", "dateReserved": "2024-05-28T14:30:37.671Z", "dateUpdated": "2024-09-13T14:17:35.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8641 (GCVE-0-2024-8641)
Vulnerability from cvelistv5
Published
2024-09-12 18:26
Modified
2024-09-13 14:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-270 - Privilege Context Switching Error
Summary
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim's CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/471954 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2595495 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8641", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T18:49:49.073195Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:50:28.115Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:10:32.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "13.7", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim\u0027s CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-270", "description": "CWE-270: Privilege Context Switching Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:26:18.243Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #471954", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/471954" }, { "name": "HackerOne Bug Bounty Report #2595495", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2595495" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 17.1.7, 17.2.5 or 17.3.2" } ], "title": "Privilege Context Switching Error in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8641", "datePublished": "2024-09-12T18:26:18.243Z", "dateReserved": "2024-09-09T23:02:07.508Z", "dateUpdated": "2024-09-13T14:10:32.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-4612 (GCVE-0-2024-4612)
Vulnerability from cvelistv5
Published
2024-09-12 16:57
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/460707 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2479857 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:22:22.140912Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:22:37.813Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:34.021Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "12.9", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:57:08.255Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #460707", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460707" }, { "name": "HackerOne Bug Bounty Report #2479857", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2479857" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above." } ], "title": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-4612", "datePublished": "2024-09-12T16:57:08.255Z", "dateReserved": "2024-05-07T15:30:44.796Z", "dateUpdated": "2024-09-13T14:17:34.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8754 (GCVE-0-2024-8754)
Vulnerability from cvelistv5
Published
2024-09-12 17:02
Modified
2024-09-17 19:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-642 - External Control of Critical State Data
Summary
An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/464062 | issue-tracking, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8754", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:19:51.513919Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:36:51.833Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.9.7", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability was discovered internally by GitLab team member [Joern Schneeweisz](https://gitlab.com/joernchen)." } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-642", "description": "CWE-642: External Control of Critical State Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:02:00.988Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #464062", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464062" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above." } ], "title": "External Control of Critical State Data in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8754", "datePublished": "2024-09-12T17:02:00.988Z", "dateReserved": "2024-09-12T14:01:59.989Z", "dateUpdated": "2024-09-17T19:36:51.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6446 (GCVE-0-2024-6446)
Vulnerability from cvelistv5
Published
2024-09-12 16:56
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-840 - Business Logic Errors
Summary
An issue has been discovered in GitLab affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/470144 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2573481 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:26:38.131802Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:01:08.784Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:36.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "17.1", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840: Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:56:53.258Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #470144", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/470144" }, { "name": "HackerOne Bug Bounty Report #2573481", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2573481" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above." } ], "title": "Business Logic Errors in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-6446", "datePublished": "2024-09-12T16:56:53.258Z", "dateReserved": "2024-07-02T09:02:11.211Z", "dateUpdated": "2024-09-13T14:17:36.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6678 (GCVE-0-2024-6678)
Vulnerability from cvelistv5
Published
2024-09-12 18:26
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-290 - Authentication Bypass by Spoofing
Summary
An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/471923 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2595495 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6678", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T03:55:35.095Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:37.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "8.14", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290: Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:26:33.060Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #471923", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/471923" }, { "name": "HackerOne Bug Bounty Report #2595495", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2595495" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above." } ], "title": "Authentication Bypass by Spoofing in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-6678", "datePublished": "2024-09-12T18:26:33.060Z", "dateReserved": "2024-07-11T04:30:36.736Z", "dateUpdated": "2024-09-13T14:17:37.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8635 (GCVE-0-2024-8635)
Vulnerability from cvelistv5
Published
2024-09-12 17:01
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/455273 | issue-tracking, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8635", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:20:26.116234Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:20:47.093Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:39.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.8", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability was discovered internally by GitLab team member [joernchen](https://gitlab.com/joernchen)" } ], "descriptions": [ { "lang": "en", "value": "A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:01:51.084Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #455273", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/455273" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 17.1.7, 17.2.5 or 17.3.2" } ], "title": "Server-Side Request Forgery (SSRF) in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8635", "datePublished": "2024-09-12T17:01:51.084Z", "dateReserved": "2024-09-09T22:02:12.310Z", "dateUpdated": "2024-09-13T14:17:39.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6389 (GCVE-0-2024-6389)
Vulnerability from cvelistv5
Published
2024-09-12 16:56
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-497 - Exposure of Sensitive System Information to an Unauthorized Control Sphere
Summary
An issue was discovered in GitLab-CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/469367 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2573397 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6389", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:27:09.811383Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:27:43.475Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:35.852Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "17.1", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [ashish_r_padelkar](https://hackerone.com/ashish_r_padelkar) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab-CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-497", "description": "CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:56:48.267Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #469367", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/469367" }, { "name": "HackerOne Bug Bounty Report #2573397", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2573397" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above." } ], "title": "Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-6389", "datePublished": "2024-09-12T16:56:48.267Z", "dateReserved": "2024-06-27T15:01:59.660Z", "dateUpdated": "2024-09-13T14:17:35.852Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8631 (GCVE-0-2024-8631)
Vulnerability from cvelistv5
Published
2024-09-12 17:11
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-267 - Privilege Defined With Unsafe Actions
Summary
A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/462665 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2478469 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8631", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:36:15.830099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:44:46.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:39.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.6", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [chotebabume](https://hackerone.com/chotebabume) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-267", "description": "CWE-267: Privilege Defined With Unsafe Actions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:11:03.832Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #462665", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/462665" }, { "name": "HackerOne Bug Bounty Report #2478469", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2478469" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 17.1.7, 17.2.5 or 17.3.2" } ], "title": "Privilege Defined With Unsafe Actions in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8631", "datePublished": "2024-09-12T17:11:03.832Z", "dateReserved": "2024-09-09T21:30:42.009Z", "dateUpdated": "2024-09-13T14:17:39.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6685 (GCVE-0-2024-6685)
Vulnerability from cvelistv5
Published
2024-09-16 21:33
Modified
2024-09-17 15:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Summary
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2, where group runners information was disclosed to unauthorised group members.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/472012 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2584372 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6685", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-17T15:25:49.220974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T15:25:59.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.7", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.3", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [ashish_r_padelkar](https://hackerone.com/ashish_r_padelkar) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2, where group runners information was disclosed to unauthorised group members." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T21:33:58.732Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #472012", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/472012" }, { "name": "HackerOne Bug Bounty Report #2584372", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2584372" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above." } ], "title": "Authorization Bypass Through User-Controlled Key in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-6685", "datePublished": "2024-09-16T21:33:58.732Z", "dateReserved": "2024-07-11T13:30:50.866Z", "dateUpdated": "2024-09-17T15:25:59.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8311 (GCVE-0-2024-8311)
Vulnerability from cvelistv5
Published
2024-09-12 18:27
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-424 - Improper Protection of Alternate Path
Summary
An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI/CD template.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/479315 | issue-tracking, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8311", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T18:45:43.633943Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:46:30.543Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:38.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability has been discovered internally by GitLab team member Andy Schoenen" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI/CD template." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-424", "description": "CWE-424: Improper Protection of Alternate Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:27:24.446Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #479315", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/479315" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.2.5, 17.3.2 or above." } ], "title": "Improper Protection of Alternate Path in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8311", "datePublished": "2024-09-12T18:27:24.446Z", "dateReserved": "2024-08-29T15:02:14.402Z", "dateUpdated": "2024-09-13T14:17:38.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-2743 (GCVE-0-2024-2743)
Vulnerability from cvelistv5
Published
2024-09-12 16:57
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/451014 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2411756 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-2743", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:21:58.095068Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:22:08.368Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:32.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "13.3", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [0xn3va](https://hackerone.com/0xn3va) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:57:23.260Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #451014", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451014" }, { "name": "HackerOne Bug Bounty Report #2411756", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2411756" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above." } ], "title": "Incorrect Authorization in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-2743", "datePublished": "2024-09-12T16:57:23.260Z", "dateReserved": "2024-03-20T14:30:41.336Z", "dateUpdated": "2024-09-13T14:17:32.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-4283 (GCVE-0-2024-4283)
Vulnerability from cvelistv5
Published
2024-09-16 21:34
Modified
2024-09-18 13:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/458502 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2474286 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4283", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:07:37.688258Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:07:40.681Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "11.1", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T21:34:08.579Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #458502", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/458502" }, { "name": "HackerOne Bug Bounty Report #2474286", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2474286" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above." } ], "title": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-4283", "datePublished": "2024-09-16T21:34:08.579Z", "dateReserved": "2024-04-26T23:02:03.272Z", "dateUpdated": "2024-09-18T13:07:40.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8124 (GCVE-0-2024-8124)
Vulnerability from cvelistv5
Published
2024-09-12 16:56
Modified
2024-09-17 11:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1333 - Inefficient Regular Expression Complexity
Summary
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a specific POST request.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/480533 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2634880 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8124", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:28:37.268844Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:29:01.868Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:37.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.4", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [sim4n6](https://hackerone.com/sim4n6) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a specific POST request." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T11:26:33.391Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #480533", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/480533" }, { "name": "HackerOne Bug Bounty Report #2634880", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2634880" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above." } ], "title": "Inefficient Regular Expression Complexity in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8124", "datePublished": "2024-09-12T16:56:33.253Z", "dateReserved": "2024-08-23T15:02:10.100Z", "dateUpdated": "2024-09-17T11:26:33.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-4660 (GCVE-0-2024-4660)
Vulnerability from cvelistv5
Published
2024-09-12 16:57
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/460892 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2480126 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4660", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:22:54.382056Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:24:41.896Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:34.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "11.2", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [js_noob](https://hackerone.com/js_noob) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:57:03.244Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #460892", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460892" }, { "name": "HackerOne Bug Bounty Report #2480126", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2480126" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above." } ], "title": "Missing Authorization in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-4660", "datePublished": "2024-09-12T16:57:03.244Z", "dateReserved": "2024-05-08T15:30:38.212Z", "dateUpdated": "2024-09-13T14:17:34.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8640 (GCVE-0-2024-8640)
Vulnerability from cvelistv5
Published
2024-09-12 16:56
Modified
2024-09-13 14:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/486213 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2687770 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8640", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:29:55.753120Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:30:16.253Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:13:28.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.11", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T16:56:23.356Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #486213", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/486213" }, { "name": "HackerOne Bug Bounty Report #2687770", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2687770" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 17.1.7, 17.2.5 or 17.3.2" } ], "title": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-8640", "datePublished": "2024-09-12T16:56:23.356Z", "dateReserved": "2024-09-09T22:30:35.372Z", "dateUpdated": "2024-09-13T14:13:28.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-4472 (GCVE-0-2024-4472)
Vulnerability from cvelistv5
Published
2024-09-12 18:26
Modified
2024-09-13 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Summary
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/460289 | issue-tracking, permissions-required | |
https://hackerone.com/reports/2477062 | technical-description, exploit, permissions-required |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4472", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T18:56:49.348769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:57:39.236Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T14:17:33.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "GitLab", "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", "vendor": "GitLab", "versions": [ { "lessThan": "17.1.7", "status": "affected", "version": "16.5", "versionType": "semver" }, { "lessThan": "17.3.2", "status": "affected", "version": "17.3", "versionType": "semver" }, { "lessThan": "17.2.5", "status": "affected", "version": "17.2", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks [ac7n0w](https://hackerone.com/ac7n0w) for reporting this vulnerability through our HackerOne bug bounty program" } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:26:38.059Z", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "name": "GitLab Issue #460289", "tags": [ "issue-tracking", "permissions-required" ], "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460289" }, { "name": "HackerOne Bug Bounty Report #2477062", "tags": [ "technical-description", "exploit", "permissions-required" ], "url": "https://hackerone.com/reports/2477062" } ], "solutions": [ { "lang": "en", "value": "Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above." } ], "title": "Insertion of Sensitive Information into Log File in GitLab" } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2024-4472", "datePublished": "2024-09-12T18:26:38.059Z", "dateReserved": "2024-05-03T19:01:56.920Z", "dateUpdated": "2024-09-13T14:17:33.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…