
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability was discovered in GitLab CE/EE affecting all versions before 16.0.8 and versions from 16.1 before 16.1.3. The issue allows developers to create pipeline schedules on protected branches even when they don't have merge access permissions (NVD, GitLab Issue).
The vulnerability stems from an authorization bypass in the Projects::PipelineSchedulesController. The controller uses the project as the subject for authorizecreatepipelineschedule!, but ProjectPolicy doesn't properly check the ref for permission :createpipeline_schedule. This allows developers to bypass branch protection rules and create pipeline schedules on branches they shouldn't have access to (GitLab Issue).
The vulnerability allows developers with no merge access to create pipeline schedules on protected branches, effectively bypassing the intended security controls. This undermines the branch protection mechanisms that are meant to restrict pipeline execution permissions on sensitive branches (GitLab Issue).
The issue was addressed in GitLab versions 16.0.8 and 16.1.3. Organizations should upgrade to these or newer versions to protect against this vulnerability. The fix involves modifying the Projects::PipelineSchedulesController to implement proper authorization checks for pipeline schedules and updating the Ci::PipelineSchedulePolicy to correctly handle protected branch permissions (GitLab Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."