AI description
CVE-2024-0402 is a vulnerability found in GitLab Community Edition (CE) and Enterprise Edition (EE). It affects versions 16.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. The vulnerability allows an authenticated user to write files to arbitrary locations on the GitLab server. This occurs when a user creates a workspace, due to improper limitation of a pathname to a restricted directory, also known as a path traversal issue.
- Description
- An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 which allows an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace.
- Source
- cve@gitlab.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.9
- Impact score
- 6
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
9
Arbitrary File Write CVE-2024-0402 in GitLab (Exploit) https://t.co/1kJrXAWpoc
@_r_netsec
29 Mar 2025
2646 Impressions
19 Retweets
35 Likes
10 Bookmarks
0 Replies
0 Quotes
Arbitrary File Write CVE-2024-0402 in GitLab (Exploit) https://t.co/1kJrXAWpoc
@_r_netsec
28 Mar 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#红队战术 1. 不使用 mimikatz 转储 lsass,并使用伪造的 ntp 数据包窃取数据 https://t.co/R62b928st9 2. 使用 Loki C2 绕过 Windows Defender 应用程序控制 https://t.co/Nwg7HS41Pg 3. 在 GitLab 中利用 CVE-2024-0402 https://t.co/yvOcXJwnpf
@42mayfly
21 Mar 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#Red_Team_Tactics 1. Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets https://t.co/cuuv6YqEsH 2. Bypassing Windows Defender Application Control with Loki C2 https://t.co/FhPlMfU6zs 3. Exploiting CVE-2024-0402 in GitLab
@akaclandestine
20 Mar 2025
11434 Impressions
80 Retweets
289 Likes
188 Bookmarks
2 Replies
0 Quotes
Arbitrary File Write CVE-2024-0402 in GitLab (Exploit) https://t.co/jRmci6PuAe
@Dinosn
19 Mar 2025
1294 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
Arbitrary File Write CVE-2024-0402 in GitLab https://t.co/q0BfDYBfgG
@axcheron
18 Mar 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub - doyensec/malicious-devfile-registry: Exploit for CVE-2024-0402 in Gitlab - https://t.co/g9HBQB6I6W
@piedpiper1616
18 Mar 2025
972 Impressions
5 Retweets
14 Likes
5 Bookmarks
0 Replies
0 Quotes
Arbitrary File Write CVE-2024-0402 in GitLab (Exploit) https://t.co/1kJrXAWpoc
@_r_netsec
18 Mar 2025
64 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2D6B2329-5500-4D95-8270-2CCB839C226F",
"versionEndExcluding": "16.5.8",
"versionStartIncluding": "16.0.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3732A61E-AFE9-4A84-B3A8-C34F0F79C5A0",
"versionEndExcluding": "16.5.8",
"versionStartIncluding": "16.0.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8429A44F-1788-421A-99A9-1E650735BBDD",
"versionEndExcluding": "16.6.6",
"versionStartIncluding": "16.6.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3D66D64A-B883-4A2C-B114-3A54F326BA8D",
"versionEndExcluding": "16.6.6",
"versionStartIncluding": "16.6.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0F871342-EDE9-49F2-8081-04651A16CD6E",
"versionEndExcluding": "16.7.4",
"versionStartIncluding": "16.7.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9A9ED476-FBE7-4022-AE16-18386E73AA59",
"versionEndExcluding": "16.7.4",
"versionStartIncluding": "16.7.0"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:16.8.0:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "246D6584-64A7-44AC-A279-ECA58E5ED1FB"
},
{
"criteria": "cpe:2.3:a:gitlab:gitlab:16.8.0:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E591D495-7397-4DA2-A643-477B2E35A915"
}
],
"operator": "OR"
}
]
}
]