CVE-2024-3127Improper Access Control in Gitlab

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 93.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22

Description

An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 17.1.6, all versions starting from 17.2 before 17.2.4, all versions starting from 17.3 before 17.3.1. Under certain conditions it may be possible to bypass the IP restriction for groups through GraphQL allowing unauthorised users to perform some actions at the group level.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages5 packages

CVEListV5gitlab/gitlab12.517.1.6+2
NVDgitlab/gitlab12.5.017.1.6+2
debiandebian/gitlab
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-9c64-9pw3-wh7p: An issue has been discovered in GitLab EE affecting all versions starting from 122024-08-22
OSV
CVE-2024-3127: An issue has been discovered in GitLab EE affecting all versions starting from 122024-08-22

📋Vendor Advisories

2
GitLab
CVE-2024-3127: An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 17.1.6, all versions starting from 17.2 before 17.2.4, all2024-08-22
Debian
CVE-2024-3127: gitlab - An issue has been discovered in GitLab EE affecting all versions starting from 1...2024

💬Community

1
Bugzilla
CVE-2021-47099 kernel: veth: ensure skb entering GRO are not cloned.2024-03-05