CVE-2024-8641
Sept. 18, 2024, 7:12 p.m.
8.8
High
Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim's CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim.
Product(s) Impacted
Vendor | Product | Versions |
---|---|---|
Gitlab |
|
|
Weaknesses
CWE-270
Privilege Context Switching Error
The product does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control.
*CPE(s)
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | gitlab | gitlab | / | / | / | / | community | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
a | gitlab | gitlab | / | / | / | / | community | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
a | gitlab | gitlab | / | / | / | / | community | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
Tags
CVSS Score
CVSS Data
- Attack Vector: NETWORK
- Attack Complexity: LOW
- Privileges Required: LOW
- Scope: UNCHANGED
- Confidentiality Impact: HIGH
- Integrity Impact: HIGH
- Availability Impact: HIGH
View Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Date
- Published: Sept. 12, 2024, 7:15 p.m.
- Last Modified: Sept. 18, 2024, 7:12 p.m.
Status : Analyzed
CVE has had analysis completed and all data associations made.
More infoSource
cve@gitlab.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.