GitLab CE/EE Vulnerability Allows Attacker to Trigger Pipeline as Another User

CVE-2024-6385
9.6CRITICAL

Key Information

Vendor
Gitlab
Status
Gitlab
Vendor
CVE Published:
11 July 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

A critical vulnerability, tracked as CVE-2024-6385, has been found in GitLab CE/EE affecting versions 15.8 prior to 16.11.6, 17.0 prior to 17.0.4, and 17.1 prior to 17.1.2. This vulnerability allows attackers to trigger a pipeline as another user under certain circumstances, potentially enabling arbitrary pipeline job execution. GitLab has issued a patch to address this critical flaw, highlighting the importance for users to update their software as soon as possible to mitigate the risk. While there is no evidence of exploitation by ransomware groups, the potential impact of this vulnerability is significant, as it could allow attackers to run malicious code, access sensitive data, and compromise software integrity. Additionally, the previous CVE-2024-5655 vulnerability highlights the need for organizations to move beyond reactive security measures and employ continuous monitoring of development tools for security risks.

Affected Version(s)

GitLab < 16.11.6

GitLab < 17.0.4

GitLab < 17.1.2

News Articles

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit exists.

  • Risk change from: 9.8 to: 9.6 - (CRITICAL)

  • First article discovered by IT Pro

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database3 News Article(s)

Credit

Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program
.