Skip to main content

CVE-2024-0861: CWE-425: Direct Request ('Forced Browsing') in GitLab GitLab

Medium
VulnerabilityCVE-2024-0861cvecve-2024-0861cwe-425
Published: Wed Feb 21 2024 (02/21/2024, 23:30:39 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the `Guest` role can change `Custom dashboard projects` settings contrary to permissions.

AI-Powered Analysis

AILast updated: 07/07/2025, 12:11:21 UTC

Technical Analysis

CVE-2024-0861 is a security vulnerability classified under CWE-425 (Direct Request, also known as Forced Browsing) affecting GitLab Enterprise Edition (EE) versions 16.4 through before 16.7.6, 16.8 through before 16.8.3, and 16.9 before 16.9.1. The flaw allows users assigned the 'Guest' role—normally restricted in permissions—to modify 'Custom dashboard projects' settings, which should be beyond their access rights. This vulnerability arises due to insufficient access control checks on the endpoint handling these settings, enabling unauthorized direct requests to alter configurations. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to have at least Guest-level privileges within the affected GitLab instance. The CVSS v3.1 base score is 4.3 (medium severity), reflecting limited impact on confidentiality and availability but a potential integrity impact due to unauthorized modification of project dashboard settings. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though GitLab typically addresses such issues in minor version updates. The vulnerability could be leveraged by malicious insiders or external attackers who have obtained Guest access to manipulate project dashboards, potentially misleading users or disrupting project visibility and management workflows.

Potential Impact

For European organizations using GitLab EE versions within the affected ranges, this vulnerability poses a moderate risk primarily to the integrity of project management data. Unauthorized changes to custom dashboard projects could lead to misinformation, misrepresentation of project statuses, or disruption of team workflows. While it does not directly compromise source code confidentiality or system availability, the integrity impact could indirectly affect decision-making and project tracking. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) may face regulatory scrutiny if such unauthorized changes lead to audit failures or operational errors. Additionally, organizations with large, distributed development teams relying heavily on GitLab dashboards for coordination may experience operational inefficiencies or increased risk of insider threats exploiting this vulnerability.

Mitigation Recommendations

European organizations should promptly identify GitLab EE instances running affected versions (16.4 up to before 16.7.6, 16.8 up to before 16.8.3, and 16.9 before 16.9.1) and plan for immediate upgrades to patched versions once available. In the interim, restrict Guest role assignments to trusted users only and audit existing Guest accounts for necessity and legitimacy. Implement strict network segmentation and access controls to limit exposure of GitLab instances to untrusted networks. Monitor GitLab logs for unusual activity related to dashboard settings changes, especially from Guest users. Employ multi-factor authentication (MFA) and strong identity management to reduce the risk of unauthorized Guest access. Consider disabling or limiting custom dashboard features if feasible until patches are applied. Engage with GitLab support or security advisories to obtain official patches or workarounds as soon as they are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2024-01-24T16:02:22.315Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253fe4

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 12:11:21 PM

Last updated: 7/27/2025, 1:13:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats