First published: Wed Feb 21 2024(Updated: )
An authorization bypass vulnerability was discovered in GitLab affecting versions 15.1 prior to 16.7.6, 16.8 prior to 16.8.3, and 16.9 prior to 16.9.1. A developer could bypass CODEOWNERS approvals by creating a merge conflict.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.1.0<16.7.6 | |
GitLab | >=16.8.0<16.8.3 | |
GitLab | =16.9.0 |
Upgrade to versions 16.9.1, 16.8.3, 16.7.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0410 is considered to be high due to its potential to bypass authorization checks.
To fix CVE-2024-0410, upgrade your GitLab installation to version 16.7.6, 16.8.3, or 16.9.1 or later.
CVE-2024-0410 affects GitLab versions from 15.1 up to 16.7.6, 16.8 up to 16.8.3, and version 16.9.0.
CVE-2024-0410 can enable unauthorized code changes by allowing developers to bypass CODEOWNERS approvals.
No official workaround is recommended for CVE-2024-0410; the best action is to upgrade to a fixed version.