An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victims CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim.
The product does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Gitlab | Gitlab | 13.7.0 (including) | 17.1.7 (excluding) | 
| Gitlab | Gitlab | 17.2.0 (including) | 17.2.5 (excluding) | 
| Gitlab | Gitlab | 17.3.0 (including) | 17.3.2 (excluding) | 
| Gitlab | Ubuntu | esm-apps/xenial | * | 
| Gitlab | Ubuntu | upstream | * |