An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.
Solution:
The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
Link | Tags |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/396533 | vendor advisory issue tracking exploit |
https://hackerone.com/reports/1889255 | broken link third party advisory exploit permissions required technical description |