Privilege Defined With Unsafe Actions in GitLab
CVE-2024-8631

7.2HIGH

Key Information:

Vendor
Gitlab
Status
Vendor
CVE Published:
12 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A privilege escalation vulnerability has been identified in GitLab EE, allowing users assigned to the Admin Group Member custom role to inadvertently escalate their privileges to access other custom roles. This issue affects multiple versions of the product, including all releases from 16.6 before 17.1.7, from 17.2 before 17.2.5, and from 17.3 before 17.3.2. The vulnerability highlights a potential security oversight, emphasizing the importance of robust access control mechanisms within the platform.

Affected Version(s)

GitLab 16.6 < 17.1.7

GitLab 17.2 < 17.2.5

GitLab 17.3 < 17.3.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

Credit

Thanks [chotebabume](https://hackerone.com/chotebabume) for reporting this vulnerability through our HackerOne bug bounty program
.