Security Vulnerability Impacts All Versions of GitLab

CVE-2024-6678
8.8HIGH

Key Information

Vendor
Gitlab
Status
Gitlab
Vendor
CVE Published:
12 September 2024

Badges

đź“° News Worthy

Summary

The vulnerability CVE-2024-6678 affects all versions of GitLab, with a critical flaw having a CVSS score of 9.9 that could allow an attacker to trigger a pipeline as an arbitrary user, leading to privileged escalation, data exfiltration, and a software supply chain compromise. While the vulnerability has not been observed in the wild, it bears strong similarities to recent high-profile attacks and tactics used by advanced persistent threat (APT) groups and cybercriminal gangs. Security professionals emphasize the urgency of patching this vulnerability, as exploiting the pipeline permissions could lead to widespread compromise of production software and access to all of the company’s source code, introduction of malicious code, and the compromise of the underlying operating system. Additionally, it is noted that a compromised account from one organization could be used to access another, posing a supply chain infection risk. The vulnerability affects nearly 30,000 companies worldwide using GitLab, and security teams are advised to ensure timely patching and encourage counterparties to do the same.

Affected Version(s)

GitLab < 17.1.7

GitLab < 17.2.5

GitLab < 17.3.2

News Articles

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by SC Media

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 News Article(s)

Credit

Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program
.