CVE-2024-6389

Sept. 14, 2024, 3:10 p.m.

4.3
Medium

Description

An issue was discovered in GitLab-CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions.

Product(s) Impacted

Vendor Product Versions
Gitlab
  • Gitlab
  • *

Weaknesses

CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a gitlab gitlab / / / / community / / /
a gitlab gitlab / / / / enterprise / / /
a gitlab gitlab / / / / community / / /
a gitlab gitlab / / / / enterprise / / /
a gitlab gitlab / / / / community / / /
a gitlab gitlab / / / / enterprise / / /

CVSS Score

4.3 / 10

CVSS Data

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: LOW
  • Integrity Impact: NONE
  • Availability Impact: NONE
  • View Vector String

    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Date

  • Published: Sept. 12, 2024, 5:15 p.m.
  • Last Modified: Sept. 14, 2024, 3:10 p.m.

Status : Analyzed

CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

More info

Source

cve@gitlab.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.