Severity
High
Analysis Summary
CVE-2024-6323 CVSS:7.5
GitLab Community and Enterprise Edition could allow a remote attacker to obtain sensitive information, caused by improper authorization validation in global search. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain private repository information in a public project, and use this information to launch further attacks against the affected system.
CVE-2024-4994 CVSS:8.1
GitLab Community and Enterprise Edition is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to execute arbitrary GraphQL mutations. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2024-4901 CVSS:8.7
GitLab Community and Enterprise Edition are vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the commit notes. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVE-2024-5655 CVSS:8.1
GitLab Community and Enterprise Edition could allow a remote authenticated attacker to bypass security restrictions, caused by improper authorization validation. By sending a specially crafted request, an attacker could exploit this vulnerability to trigger a pipeline as another user.
Impact
- Gain Access
- Security Bypass
- Cross-Site Scripting
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2024-6323
- CVE-2024-4994
- CVE-2024-4901
- CVE-2024-5655
Affected Vendors
Affected Products
- GitLab Community Edition 16.11.0
- GitLab Enterprise Edition 16.11.0
- GitLab Community Edition 17.0.0
- GitLab Enterprise Edition 17.0.0
- GitLab Enterprise Edition 17.1.0
- GitLab Community Edition 17.1.0
Remediation
Refer to GitLab Website for patch, upgrade or suggested workaround information.