Incorrect Ownership Assignment in GitLab
CVE-2024-9633

7.5HIGH

Key Information:

Vendor
Gitlab
Status
Vendor
CVE Published:
14 November 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant issue has been identified in GitLab CE/EE, where an attacker can manipulate the creation of groups with names that intercept existing unique Pages domains. This situation leads to potential domain confusion, wherein users may unknowingly interact with malicious content or entities masquerading under the guise of legitimate Pages traffic. The vulnerability affects GitLab versions 16.3 through 17.4.2, 17.5 through 17.5.4, and 17.6 through 17.6.2, highlighting the need for users to adopt precise configurations and oversight. More information can be found in GitLab's issue tracking and in related bug bounty reports documenting the technical exploits associated with this vulnerability.

Affected Version(s)

GitLab 16.3 < 17.4.2

GitLab 17.5 < 17.5.4

GitLab 17.6 < 17.6.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

Credit

Thanks [psycho_012](https://hackerone.com/psycho_012) for reporting this vulnerability through our HackerOne bug bounty program
.