CVE-2024-8311
Sept. 18, 2024, 7:12 p.m.
6.5
Medium
Description
An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI/CD template.
Product(s) Impacted
Vendor | Product | Versions |
---|---|---|
Gitlab |
|
|
Weaknesses
CWE-424
Improper Protection of Alternate Path
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources.
*CPE(s)
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
Tags
CVSS Score
CVSS Data
- Attack Vector: NETWORK
- Attack Complexity: LOW
- Privileges Required: LOW
- Scope: UNCHANGED
- Confidentiality Impact: NONE
- Integrity Impact: HIGH
- Availability Impact: NONE
View Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Date
- Published: Sept. 12, 2024, 7:15 p.m.
- Last Modified: Sept. 18, 2024, 7:12 p.m.
Status : Analyzed
CVE has had analysis completed and all data associations made.
More infoSource
cve@gitlab.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.