{"id":"CVE-2024-5258","summary":"Authorization Bypass Through User-Controlled Key in GitLab","details":"An authorization vulnerability exists within GitLab from versions 16.10 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.","aliases":["BIT-gitlab-2024-5258"],"modified":"2026-04-10T05:12:21.880789Z","published":"2024-05-23T11:02:06.904Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/5xxx/CVE-2024-5258.json","cwe_ids":["CWE-639"],"cna_assigner":"GitLab"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/5xxx/CVE-2024-5258.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5258"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/443254"},{"type":"PACKAGE","url":"git://git@gitlab.com:gitlab-org/gitlab.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"053df647320e7cac5c255f9e07264a0c35548409"},{"fixed":"d134e2329e12dc93e72a8c3ed2744f75ef7a7e81"}],"database_specific":{"versions":[{"introduced":"16.10"},{"fixed":"16.10.6"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"22834294718a25956b0a859c8eed72248300eeee"},{"fixed":"a5580f77e8802b47efc524ce8df3aff25b0ffcc2"}],"database_specific":{"versions":[{"introduced":"16.11"},{"fixed":"16.11.3"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"8c75d0bf4a4190d94326f1a854d0a102ceca4392"},{"fixed":"cf71f280df3632187495bfd47cc408d1f0b50a3b"}],"database_specific":{"versions":[{"introduced":"17.0"},{"fixed":"17.0.1"}]}}],"versions":["v16.10.0-ee","v16.10.3-ee","v16.10.6-rc42-ee","v16.11.0-ee","v16.11.3-rc42-ee","v17.0.0-ee","v17.0.1-rc42-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5258.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}