Loading HuntDB...

Removed Guest role user who dosent have access to private project in members able to view jobs

None
G
GitLab
Submitted None
Reported by tarun_sec

Vulnerability Details

Technical details and impact analysis

Improper Authorization
A removed guest role user, who no longer has access to private projects, is still able to view jobs associated with those projects. This issue indicates a potential security gap where access controls may not be effectively enforced after user removal. Summary In the scenario where a user with a guest role is removed from a private project, their access should be completely revoked. However, in this case, despite the removal, the user can still view job details associated with the private project. This behavior suggests a flaw in the access control mechanism, allowing unauthorized visibility of sensitive project-related information. Steps to reproduce 1 Invite a guest role user to a private project through the owner account 2 Through guest role user access the job as raw format >https://cdn.artifacts.gitlab-static.net/f3/93/id 3 After Owner remove him from private project but still the link is accessible to him without having access to private project and that particular team That can disclose him some sensitive info such ( env , sensitive docker images , crtitical information to him ) Mitigations Ensure that the system correctly enforces access controls and revokes all permissions for removed users. This may involve auditing and enhancing the user role management and permission handling processes. If you have any more more questions Comment on the report Regards @mrrobot ## Impact As an attacker Removed users gaining access to job details can expose sensitive project data or operational information. This could lead to inadvertent or malicious leakage of internal processes and project specifics.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Improper Authorization