CVE-2024-12570
MEDIUMDescription
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.4.6, from 17.5 prior to 17.5.4, and from 17.6 prior to 17.6.2. It may have been possible for an attacker with a victim's `CI_JOB_TOKEN` to obtain a GitLab session token belonging to the victim.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| gitlab | gitlab |
| gitlab | gitlab |
| gitlab | gitlab |
| gitlab | gitlab |
| gitlab | gitlab |
| gitlab | gitlab |
References
Advisories & Patches
Other References
Frequently Asked Questions
What is CVE-2024-12570? +
How severe is CVE-2024-12570? +
What products are affected by CVE-2024-12570? +
How do I check if I'm vulnerable to CVE-2024-12570? +
Related Vulnerabilities
When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start …
XWiki is a generic wiki platform. Any user with edit right on a page (could be the user's profile) can …
A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all …
System call entry on Cortex M (and possibly R and A, but I think not) has a race which allows …
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data …
Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.