Page 7 of 122 results (0.003 seconds)

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances. • https://gitlab.com/gitlab-org/gitlab/-/issues/471923 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim's CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim. • https://gitlab.com/gitlab-org/gitlab/-/issues/471954 • CWE-270: Privilege Context Switching Error •

CVSS: 8.3EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles. • https://gitlab.com/gitlab-org/gitlab/-/issues/462665 • CWE-267: Privilege Defined With Unsafe Actions •

CVSS: 8.5EPSS: 0%CPEs: 3EXPL: 0

12 Sep 2024 — An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured. • https://gitlab.com/gitlab-org/gitlab/-/issues/464062 • CWE-642: External Control of Critical State Data •

CVSS: 7.7EPSS: 0%CPEs: 3EXPL: 0

12 Sep 2024 — A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL • https://gitlab.com/gitlab-org/gitlab/-/issues/455273 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 9.4EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables. • https://gitlab.com/gitlab-org/gitlab/-/issues/451014 • CWE-863: Incorrect Authorization •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow. • https://gitlab.com/gitlab-org/gitlab/-/issues/460707 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates. • https://gitlab.com/gitlab-org/gitlab/-/issues/460892 • CWE-862: Missing Authorization •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration. • https://gitlab.com/gitlab-org/gitlab/-/issues/464044 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 1

12 Sep 2024 — An issue has been discovered in GitLab affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application. • https://gitlab.com/gitlab-org/gitlab/-/issues/470144 • CWE-840: Business Logic Errors •