Products
GitLab CE/EE
- 16.7 - 17.1.7
- 17.2 - 17.2.5
- 17.3 - 17.3.2
Source
cve@gitlab.com
Tags
CVE-2024-6685 details
Published : Sept. 16, 2024, 10:15 p.m.
Last Modified : Sept. 16, 2024, 10:15 p.m.
Last Modified : Sept. 16, 2024, 10:15 p.m.
Description
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2, where group runners information was disclosed to unauthorised group members.
CVSS Score
1 | 2 | 3.1 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-639 | Authorization Bypass Through User-Controlled Key | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
Base Score
3.1
Exploitability Score
1.6
Impact Score
1.4
Base Severity
LOW
Vector String : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
References
URL | Source |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/472012 | cve@gitlab.com |
https://hackerone.com/reports/2584372 | cve@gitlab.com |
This website uses the NVD API, but is not approved or certified by it.