Skip to main content

CVE-2024-0456: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab

Medium
VulnerabilityCVE-2024-0456cvecve-2024-0456cwe-425
Published: Fri Jan 26 2024 (01/26/2024, 01:02:43 UTC)
Source: CVE Database V5
Vendor/Project: GitLab
Product: GitLab

Description

An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project

AI-Powered Analysis

AILast updated: 07/07/2025, 23:39:52 UTC

Technical Analysis

CVE-2024-0456 is an authorization vulnerability identified in GitLab, affecting versions from 14.0 up to but not including 16.6.6, versions 16.7 up to but not including 16.7.4, and versions 16.8 up to but not including 16.8.1. The vulnerability is categorized under CWE-425, which relates to Direct Request or Forced Browsing issues. Specifically, this flaw allows an unauthorized attacker who has created Merge Requests (MRs) within a project to assign arbitrary users to those MRs without proper authorization checks. This means that an attacker with at least limited project access and the ability to create MRs can manipulate the assignment of users to MRs, potentially causing confusion, misattribution of code reviews, or manipulation of project workflows. The vulnerability does not allow direct access to confidential data or modification of code but impacts the integrity of project management processes by undermining proper authorization controls. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). There are no known exploits in the wild reported at this time, and no patch links were provided in the source data, but it is expected that GitLab has or will release patches in versions 16.6.6, 16.7.4, and 16.8.1 to address this issue.

Potential Impact

For European organizations using GitLab for source code management and collaboration, this vulnerability can disrupt development workflows by allowing unauthorized assignment of users to merge requests. This could lead to improper code review assignments, potential delays in development cycles, and confusion among development teams. While it does not directly expose sensitive data or allow code modification by unauthorized users, the integrity of project management and review processes is compromised. In regulated industries or organizations with strict compliance requirements, such manipulation could have downstream effects on audit trails and accountability. Additionally, attackers could leverage this flaw as part of a broader attack chain to sow discord or misattribute responsibility within development teams, potentially facilitating social engineering or insider threat scenarios. The impact is more pronounced in large organizations with complex project structures and multiple contributors, common in European enterprises and public sector entities.

Mitigation Recommendations

European organizations should prioritize upgrading GitLab instances to the fixed versions 16.6.6, 16.7.4, or 16.8.1 as soon as these patches are available. Until patches are applied, organizations should implement strict access controls limiting who can create merge requests and assign users within projects, ideally restricting this capability to trusted personnel. Monitoring and auditing merge request assignments for unusual changes or unauthorized user assignments can help detect exploitation attempts. Additionally, organizations can enforce multi-factor authentication and review project membership regularly to minimize the risk of privilege abuse. If immediate patching is not feasible, consider temporarily disabling or restricting merge request assignment features or workflows that allow arbitrary user assignments. Finally, maintain awareness of GitLab security advisories and subscribe to vendor notifications to ensure timely response to updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2024-01-12T08:02:33.279Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68387d4f182aa0cae28316b8

Added to database: 5/29/2025, 3:29:19 PM

Last enriched: 7/7/2025, 11:39:52 PM

Last updated: 7/31/2025, 12:09:36 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats