First published: Thu Apr 25 2024(Updated: )
An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.9.0<16.9.6 | |
GitLab | >=16.9.0<16.9.6 | |
GitLab | >=16.10.0<16.10.4 | |
GitLab | >=16.10.0<16.10.4 | |
GitLab | =16.11.0 | |
GitLab | =16.11.0 |
Upgrade to versions 16.9.6, 16.10.4, 16.11.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2434 has a medium severity rating due to its potential to cause denial of service and restricted file read.
To fix CVE-2024-2434, upgrade GitLab to version 16.9.6 or later, 16.10.4 or later, or 16.11.1 or later.
CVE-2024-2434 affects GitLab CE/EE versions prior to 16.9.6, 16.10.4, and 16.11.1.
CVE-2024-2434 is a path traversal vulnerability that can lead to denial of service.
CVE-2024-2434 does not directly allow unauthorized access, but it can lead to restricted file reads.