First published: Thu May 23 2024(Updated: )
An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.10.0<16.10.6 | |
GitLab | >=16.10.0<16.10.6 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | =17.0.0 | |
GitLab | =17.0.0 |
Upgrade to versions 16.10.6, 16.11.3, 17.0.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5258 is classified as a medium-severity authorization vulnerability.
To fix CVE-2024-5258, update GitLab to version 16.10.6, 16.11.3, or 17.0.1 or later.
CVE-2024-5258 affects GitLab versions 16.10.0 to 16.10.5, 16.11.0 to 16.11.2, and 17.0.0.
CVE-2024-5258 enables authenticated attackers to bypass pipeline authorization logic through a crafted naming convention.
Users of GitLab versions 16.10, 16.11, and 17.0 below the specified patched versions are impacted by CVE-2024-5258.