An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables.
Solution:
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/451014 | broken link issue tracking permissions required |
https://hackerone.com/reports/2411756 | exploit permissions required technical description |
https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/ |