First published: Wed Jun 12 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.4 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab's Asana integration allowed an attacker to potentially cause a regular expression denial of service by sending specially crafted requests.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.4<16.10.7 | |
GitLab | >=8.4<16.10.7 | |
GitLab | >=16.11.0<16.11.4 | |
GitLab | >=16.11.0<16.11.4 | |
GitLab | >=17.0<=17.0.2 | |
GitLab | >=17.0<17.0.2 |
Upgrade to versions 16.10.7, 16.11.4, 17.0.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1963 has been classified with a medium severity level due to its potential impact on the affected GitLab systems.
To mitigate CVE-2024-1963, you should update your GitLab installation to the latest version that addresses this vulnerability.
CVE-2024-1963 affects all GitLab CE/EE versions from 8.4 up to but not including 16.10.7, 16.11 up to but not including 16.11.4, and 17.0 up to but not including 17.0.2.
CVE-2024-1963 is a vulnerability associated with GitLab's Asana integration that could allow an attacker to exploit regular expression handling.
Yes, CVE-2024-1963 is present in older versions of GitLab starting from 8.4 up to the specified later versions that are affected.