First published: Thu Jul 11 2024(Updated: )
An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.8.0<16.11.6 | |
GitLab | >=15.8.0<16.11.6 | |
GitLab | >=17.0.0<17.0.4 | |
GitLab | >=17.0.0<17.0.4 | |
GitLab | >=17.1.0<17.1.2 | |
GitLab | >=17.1.0<17.1.2 |
Upgrade to versions 17.1.2, 17.0.4, 16.11.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6385 is considered a critical vulnerability that can allow attackers to trigger pipelines as another user.
To fix CVE-2024-6385, upgrade GitLab to version 16.11.6 or later, or to version 17.0.4 or later, or to version 17.1.2 or later.
CVE-2024-6385 affects GitLab CE/EE versions from 15.8 up to but not including 16.11.6, from 17.0 up to but not including 17.0.4, and from 17.1 up to but not including 17.1.2.
Yes, CVE-2024-6385 can be exploited remotely under certain conditions by an attacker.
Exploitation of CVE-2024-6385 can allow an attacker to run pipelines with the permissions of another user, potentially leading to unauthorized actions within the GitLab environment.