
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.3 before 17.4.2, all versions starting from 17.5 before 17.5.4, and all versions starting from 17.6 before 17.6.2. This vulnerability allows an attacker to create a group with a name matching an existing unique Pages domain, potentially leading to domain confusion attacks (GitLab Release, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 3.1 (LOW) with the vector string AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L. The issue is related to incorrect ownership assignment and has been classified under CWE-708 (NVD).
The vulnerability could lead to domain confusion attacks when an attacker creates a group with a name matching an existing unique Pages domain (GitLab Release).
The issue has been fixed in GitLab versions 17.4.2, 17.5.4, and 17.6.2. Users are strongly recommended to upgrade to these patched versions immediately (GitLab Release).
The vulnerability was reported through GitLab's HackerOne bug bounty program by researcher psycho_012 (GitLab Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."