First published: Thu Apr 25 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.9.6 | |
GitLab | <16.9.6 | |
GitLab | >=16.10.0<16.10.4 | |
GitLab | >=16.10.0<16.10.4 | |
GitLab | =16.11.0 | |
GitLab | =16.11.0 |
Upgrade to versions 16.9.6, 16.10.4, 16.11.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1347 has a high severity rating due to its potential to allow unauthorized actions through crafted email addresses.
To fix CVE-2024-1347, upgrade your GitLab instance to version 16.9.6 or greater, or ensure you are using versions 16.10.4 or later.
CVE-2024-1347 affects GitLab versions prior to 16.9.6, between 16.10.0 and 16.10.4, and exactly 16.11.0.
Any users of GitLab CE and EE versions that fall within the specified vulnerable ranges are affected by CVE-2024-1347.
CVE-2024-1347 is a security vulnerability that allows attackers to bypass domain-based filtering under certain conditions.