CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8970

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00015/1

CVE-2024-8970 is a GitLab CE/EE vulnerability that allows an attacker to trigger a pipeline as another user. This issue impacts versions from 11.6 before 17.2.9, 17.3 before 17.3.5, and 17.4 before 17.4.2. While the CVSS score is 0, indicating no severity, the SVRS score of 30 suggests a low-level risk. This vulnerability could allow unauthorized users to execute code or access sensitive data within the pipeline context of another user. The vulnerability is significant because it compromises user identity and potentially allows for malicious activities under the guise of a legitimate user. Prompt patching is advisable to mitigate the risk of unauthorized pipeline triggers and potential data breaches, even though the vulnerability is currently considered low-risk.

In The Wild
2024-10-11

2024-10-15

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9
Nikhil George2025-04-01
GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9 | Today we are releasing versions 17.4.2, 17.3.5, 17.2.9 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action. <
gitlab.com
rss
forum
news
GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5
Greg Alfaro2025-03-01
GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5 | Today we are releasing versions 17.7.1, 17.6.3, 17.5.5 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action. GitLab releases fixes for vulnerabilities
gitlab.com
rss
forum
news
GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution
Pierluigi Paganini2024-10-11
GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution | GitLab issued updates for CE and EE to address multiple flaws, including a critical bug allowing CI/CD pipeline runs on unauthorized branches. GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE) to address multiple vulnerabilities, including a critical bug, tracked as CVE-2024-9164 (CVSS score of 9.6), allowing CI/CD pipeline runs on unauthorized [&#8230;] GitLab issued updates for CE
securityaffairs.co
rss
forum
news

Social Media

CVE-2024-8970 (CVSS:8.2, HIGH) is Received. An issue was discovered in GitLab CE/EE affecting all versions starting from 11.6 prior to 17.2.9, starting from 17.3 pr..https://t.co/irpqDtb05D #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0
CVE-2024-8970 Privilege Escalation via Pipeline Trigger in GitLab CE/EE A problem in GitLab CE/EE affects versions from 11.6 to before 17.2.9, 17.3 to before 17.3.5, and 17.4 to before 17.4.2. This lets an attack... https://t.co/982BvE92Ua
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://gitlab.com/gitlab-org/gitlab/-/issues/490916
[email protected]https://hackerone.com/reports/2724948

CWE Details

CWE IDCWE NameDescription
CWE-863Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence