First published: Fri Apr 12 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. A payload may lead to a Stored XSS while using the diff viewer, allowing attackers to perform arbitrary actions on behalf of victims.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.9.0<16.9.4 | |
GitLab | >=16.9.0<16.9.4 | |
GitLab | >=16.10.0<16.10.2 | |
GitLab | >=16.10.0<16.10.2 |
Upgrade to versions 16.9.4, 16.10.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3092 is considered a medium severity vulnerability due to its potential for stored cross-site scripting.
CVE-2024-3092 allows attackers to execute arbitrary actions on behalf of victims through the diff viewer.
CVE-2024-3092 affects GitLab CE/EE versions starting from 16.9 before 16.9.4 and 16.10 before 16.10.2.
To fix CVE-2024-3092, upgrade your GitLab to versions 16.9.4 or 16.10.2 or later.
Yes, CVE-2024-3092 has known exploitation vectors due to its nature of allowing stored XSS attacks.