CVE-2024-5258

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-5258
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-5258.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-5258
Aliases
Downstream
Published
2024-05-23T11:02:06.904Z
Modified
2025-12-01T18:35:54.197171Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Authorization Bypass Through User-Controlled Key in GitLab
Details

An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/5xxx/CVE-2024-5258.json",
    "cna_assigner": "GitLab",
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.10"
        },
        {
            "fixed": "16.10.6"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.11"
        },
        {
            "fixed": "16.11.3"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "17.0"
        },
        {
            "fixed": "17.0.1"
        }
    ]
}

Affected versions

v16.*

v16.10.0-ee
v16.10.1-ee
v16.10.2-ee
v16.10.3-ee
v16.10.4-ee
v16.10.5-ee
v16.10.6-rc42-ee
v16.11.0-ee
v16.11.1-ee
v16.11.2-ee
v16.11.3-rc42-ee

v17.*

v17.0.0-ee
v17.0.1-rc42-ee

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-5258.json"