Description
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.
Problem types
CWE-288: Authentication Bypass Using an Alternate Path or Channel
Product status
13.1 (semver) before 18.4.6
18.5 (semver) before 18.5.4
18.6 (semver) before 18.6.2
Credits
Thanks [jcarre](https://hackerone.com/jcarre) for reporting this vulnerability through our HackerOne bug bounty program
References
gitlab.com/gitlab-org/gitlab/-/issues/577847 (GitLab Issue #577847)
hackerone.com/reports/3322714 (HackerOne Bug Bounty Report #3322714)
about.gitlab.com/...10/patch-release-gitlab-18-6-2-released/