CVE-2024-1525Authentication Bypass Using an Alternate Path or Channel in Gitlab

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 99.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 22

Description

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.6 | Impact: 3.6

Affected Packages5 packages

CVEListV5gitlab/gitlab16.916.9.1
NVDgitlab/gitlab16.116.7.6+2
debiandebian/gitlab< gitlab 17.3.5-2 (sid)
gitlabgitlab/gitlab

🔴Vulnerability Details

2
OSV
CVE-2024-1525: An issue has been discovered in GitLab CE/EE affecting all versions starting from 162024-02-22
GHSA
GHSA-2v36-29xm-jp89: An issue has been discovered in GitLab CE/EE affecting all versions starting from 162024-02-22

📋Vendor Advisories

2
GitLab
CVE-2024-1525: An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, a2024-02-22
Debian
CVE-2024-1525: gitlab - An issue has been discovered in GitLab CE/EE affecting all versions starting fro...2024