First published: Tue Jul 09 2024(Updated: )
A Cross Window Forgery vulnerability exists within GitLab CE/EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.3.0<16.11.5 | |
GitLab | >=16.3.0<16.11.5 | |
GitLab | >=17.0.0<17.0.3 | |
GitLab | >=17.0.0<17.0.3 | |
GitLab | =17.1.0 | |
GitLab | =17.1.0 |
Upgrade to versions 16.11.5, 17.0.3, 17.1.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2177 has been classified with a high severity level due to its potential impact on OAuth authentication.
To mitigate CVE-2024-2177, update GitLab CE/EE to versions 16.11.5, 17.0.3, or 17.1.1 or later.
CVE-2024-2177 affects GitLab CE/EE versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1.
CVE-2024-2177 is a Cross Window Forgery vulnerability that exploits the OAuth authentication flow.
No, if you are using an updated version of GitLab that is not affected, you are not vulnerable to CVE-2024-2177.