CVE-2024-6678

An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 09:50

Type Values Removed Values Added
References
  • () https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/ -
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.9

18 Sep 2024, 19:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.9
v2 : unknown
v3 : 8.8
First Time Gitlab
Gitlab gitlab
Summary
  • (es) Se descubrió un problema en GitLab CE/EE que afecta a todas las versiones desde la 8.14 anterior a la 17.1.7, desde la 17.2 anterior a la 17.2.5 y desde la 17.3 anterior a la 17.3.2, que permite a un atacante activar una canalización como un usuario arbitrario en determinadas circunstancias.
CPE cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
References () https://gitlab.com/gitlab-org/gitlab/-/issues/471923 - () https://gitlab.com/gitlab-org/gitlab/-/issues/471923 - Broken Link
References () https://hackerone.com/reports/2595495 - () https://hackerone.com/reports/2595495 - Permissions Required

12 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-12 19:15

Updated : 2024-11-21 09:50


NVD link : CVE-2024-6678

Mitre link : CVE-2024-6678

CVE.ORG link : CVE-2024-6678


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-290

Authentication Bypass by Spoofing