Missing Authentication for Critical Function (CWE-306)
An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches. This vulnerability is related to Missing Authentication for Critical Function (CWE-306).
This vulnerability has a high severity with a CVSS v3.1 base score of 9.6. It allows attackers to run pipelines on arbitrary branches, potentially leading to unauthorized code execution and data manipulation. The impact on confidentiality and integrity is high, while availability is not affected. The attack vector is network-based, requires low attack complexity, and needs low privileges to exploit. No user interaction is required, and the scope is changed, indicating potential impact beyond the vulnerable component.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available. GitLab has released fixed versions: 17.2.9, 17.3.5, and 17.4.2. Users should upgrade to these patched versions or later to mitigate the vulnerability.
1. Immediately upgrade GitLab EE to the latest patched versions: 17.2.9, 17.3.5, 17.4.2, or later. 2. If immediate patching is not possible, consider restricting network access to the GitLab instance to trusted IP addresses only. 3. Monitor GitLab logs for any suspicious pipeline activities, especially those running on unexpected branches. 4. Implement strong authentication mechanisms and access controls for GitLab users and integrations. 5. Regularly review and audit pipeline configurations and permissions. 6. Keep abreast of GitLab security announcements and apply future security updates promptly.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Feedly found the first article mentioning CVE-2024-9164. See article
Feedly estimated the CVSS score as HIGH
CVE-2024-9164 is a critical vulnerability in GitLab, with a CVSS score of 9.6, that allows malicious actors to run pipelines on arbitrary branches, potentially leading to unauthorized access to sensitive data and systems. GitLab has released patches in versions 17.4.2, 17.3.5, and 17.2.9 for both Community and Enterprise Editions, and users are strongly urged to upgrade immediately to mitigate this risk. The article does not mention any proof-of-concept exploits or specific instances of exploitation in the wild. See article
NVD published the first details for CVE-2024-9164
A CVSS base score of 9.6 has been assigned.
Detection for the vulnerability has been added to Nessus (208737)
This CVE started to trend in security discussions
EPSS Score was set to: 0.04% (Percentile: 9.7%)
This CVE stopped trending in security discussions