Home » Database

AVID-2026-R1599

Description

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) in GitLab (CVE-2024-7110)

Details

An issue was discovered in GitLab EE affecting all versions starting 17.0 to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1 allows an attacker to execute arbitrary command in a victim’s pipeline through prompt injection.

Reason for inclusion in AVID: CVE-2024-7110 is a command-injection vulnerability in GitLab that enables arbitrary command execution in a victim’s CI pipeline. GitLab is a widely used tool in ML/AI development and deployment pipelines, so this directly affects the software supply chain for AI systems. The vulnerability is clearly security-related and the report provides explicit details (scope, impact, references), supporting its relevance to AI supply chains. Therefore it meets all four criteria for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: GitLab
  • Deployer: GitLab
  • Artifact Details:
TypeName
SystemGitLab

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
Base Score6.4
Base Severity🟠 Medium
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionREQUIRED
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability ImpactNONE

CWE

IDDescription
CWE-77CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-08-22
  • Version: 0.3.3
  • AVID Entry