First published: Fri Jan 26 2024(Updated: )
An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.0.0<16.6.6 | |
GitLab | >=14.0.0<16.6.6 | |
GitLab | >=16.7.0<16.7.4 | |
GitLab | >=16.7.0<16.7.4 | |
GitLab | =16.8.0 | |
GitLab | =16.8.0 |
Upgrade to versions 16.8.1, 16.7.4, 16.6.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0456 is classified as a critical authorization vulnerability affecting specific versions of GitLab.
To mitigate CVE-2024-0456, upgrade GitLab to versions 16.6.6, 16.7.4, or 16.8.1 or later.
CVE-2024-0456 affects GitLab versions from 14.0.0 to 16.6.6, 16.7.0 to 16.7.4, and the exact version 16.8.0.
Yes, unauthorized users can exploit CVE-2024-0456 to assign arbitrary users to merge requests they've created.
CVE-2024-0456 is an authorization vulnerability in GitLab.