First published: Thu Jan 09 2025(Updated: )
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. When a user is created via the SAML provider, the external groups setting overrides the external provider configuration. As a result, the user may not be marked as external thereby giving those users access to internal projects or groups.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab Community Edition | >=16.4<17.5.5>=17.6<17.6.3>=17.7<17.7.1 |
Upgrade to version 17.5.5, 17.6.3 or 17.7.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13041 has a moderate severity level due to the potential for improper group management when using SAML for user creation.
To mitigate CVE-2024-13041, update your GitLab CE/EE to version 17.5.5 or later, or version 17.6.3 or later, or version 17.7.1 or later.
CVE-2024-13041 affects GitLab CE/EE versions from 16.4 up to 17.5.5, from 17.6 up to 17.6.3, and from 17.7 up to 17.7.1.
CVE-2024-13041 describes a flaw where the external groups setting can override the external provider configuration when users are created via the SAML provider.
There are no documented workarounds for CVE-2024-13041, so upgrading GitLab to the fixed versions is necessary to resolve the vulnerability.