
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity vulnerability (CVE-2024-6323) was discovered in GitLab Enterprise Edition affecting versions from 16.11 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. The vulnerability was reported by GitLab Team Member @joernchen and received a CVSS v3.1 base score of 7.5 (GitLab Release).
The vulnerability stems from an improper authorization implementation in the global search functionality of GitLab EE. The issue is classified under CWE-863 (Incorrect Authorization) and has been assigned a CVSS vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network accessibility, low attack complexity, no privileges required, and high confidentiality impact (NVD).
The vulnerability allows an attacker to leak content of a private repository that exists within a public project, potentially exposing sensitive information. This represents a significant confidentiality breach as it could expose private code and sensitive data to unauthorized users (CERT-EU).
The vulnerability has been fixed in GitLab Enterprise Edition versions 16.11.5, 17.0.3, and 17.1.1. Organizations running affected versions are strongly recommended to upgrade to the patched versions immediately. GitLab.com has already been updated with the patched version (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."