First published: Thu Mar 07 2024(Updated: )
An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload in an old feature branch to perform malicious actions.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.3<16.7.7 | |
GitLab | >=11.3<16.7.7 | |
GitLab | >=16.8.0<16.8.4 | |
GitLab | >=16.8.0<16.8.4 | |
GitLab | >=16.9.0<16.9.2 | |
GitLab | >=16.9.0<16.9.2 |
Upgrade to versions 16.7.7, 16.8.4, 16.9.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0199 is classified as a high severity authorization bypass vulnerability affecting multiple versions of GitLab.
To fix CVE-2024-0199, update GitLab to version 16.7.7 or later for versions 11.3 to 16.7.6, or to version 16.8.4 or later for versions 16.8.0 to 16.8.3, and to version 16.9.2 or later for versions 16.9.0 to 16.9.1.
CVE-2024-0199 affects GitLab community and enterprise editions from version 11.3 to 16.7.6, versions 16.8.0 to 16.8.3, and 16.9.0 to 16.9.1.
An attacker can exploit CVE-2024-0199 by using a crafted payload in an old feature branch to bypass CODEOWNERS and perform unauthorized actions.
Yes, CVE-2024-0199 has been resolved in the latest GitLab versions 16.7.7, 16.8.4, and 16.9.2.