An issue has been discovered in GitLab EE affecting all versions starting from 16.8 before 16.8.2. When a user is assigned a custom role with manage_group_access_tokens permission, they may be able to create group access tokens with Owner privileges, which may lead to privilege escalation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/439175 |
History
Thu, 03 Oct 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-269 |
Thu, 03 Oct 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Improper Privilege Management in GitLab | Privilege Chaining in GitLab |
Weaknesses | CWE-268 |
Thu, 29 Aug 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* |
MITRE
Status: PUBLISHED
Assigner: GitLab
Published: 2024-02-12T20:47:44.401Z
Updated: 2024-10-03T06:23:18.258Z
Reserved: 2024-02-06T07:02:25.333Z
Link: CVE-2024-1250
Vulnrichment
No data.
NVD
Status : Modified
Published: 2024-02-12T21:15:08.313
Modified: 2024-11-21T08:50:09.347
Link: CVE-2024-1250
Redhat
No data.