First published: Wed Feb 21 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.1<16.7.6 | |
GitLab | >=16.8<16.8.3 | |
GitLab | =16.9.0 |
Upgrade to versions 16.7.6, 16.8.3, 16.9.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1525 is classified as a medium severity vulnerability affecting GitLab.
To fix CVE-2024-1525, you should upgrade GitLab to version 16.7.6, 16.8.3, or any version beyond 16.9.1.
CVE-2024-1525 affects GitLab versions starting from 16.1 before 16.7.6, 16.8 before 16.8.3, and 16.9 before 16.9.1.
CVE-2024-1525 is related to an LDAP user being able to reset their password under specific conditions.
Currently, the recommended solution for CVE-2024-1525 is to update to an unaffected version of GitLab, as there is no known workaround.