7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
6.6 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.5%
An authorization bypass vulnerability was discovered in GitLab affecting
versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to
16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload
in an old feature branch to perform malicious actions.
about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/
gitlab.com/gitlab-org/gitlab/-/issues/436977
hackerone.com/reports/2295423
launchpad.net/bugs/cve/CVE-2024-0199
nvd.nist.gov/vuln/detail/CVE-2024-0199
security-tracker.debian.org/tracker/CVE-2024-0199
www.cve.org/CVERecord?id=CVE-2024-0199
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
6.6 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.5%