First published: Thu Sep 12 2024(Updated: )
An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.3.0<17.1.7 | |
GitLab | >=17.2.0<17.2.5 | |
GitLab | >=17.3.0<17.3.2 |
Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2743 is considered a high severity vulnerability that allows unauthorized modification of DAST scans.
To fix CVE-2024-2743, upgrade GitLab to version 17.1.7 or later, 17.2.5 or later, or 17.3.2 or later.
CVE-2024-2743 allows an attacker to modify on-demand DAST scans and potentially leak sensitive variables.
CVE-2024-2743 affects GitLab-EE versions from 13.3 up to 17.1.7, 17.2 up to 17.2.5, and 17.3 up to 17.3.2.
CVE-2024-2743 specifically affects GitLab Enterprise Edition (EE) and does not apply to community editions.