First published: Thu Dec 12 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.4.6, from 17.5 prior to 17.5.4, and from 17.6 prior to 17.6.2. It may have been possible for an attacker with a victim's `CI_JOB_TOKEN` to obtain a GitLab session token belonging to the victim.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab Community Edition | >13.7<17.4.6>17.5<17.5.4>17.6<17.6.2 |
Upgrade to versions 17.4.6, 17.5.4, 17.6.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12570 is considered a high severity vulnerability due to the potential for unauthorized access to user session tokens.
To fix CVE-2024-12570, upgrade your GitLab CE/EE instance to version 17.4.6, 17.5.4, or 17.6.2 or later.
CVE-2024-12570 affects GitLab CE/EE versions starting from 13.7 up to but not including 17.4.6, 17.5 up to but not including 17.5.4, and 17.6 up to but not including 17.6.2.
An attacker can exploit CVE-2024-12570 by using a victim's CI_JOB_TOKEN to obtain their GitLab session token.
CVE-2024-12570 is considered a remote vulnerability as it can be exploited without physical access to the affected system.