First published: Wed Jun 26 2024(Updated: )
An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.0.0<16.11.5 | |
GitLab | >=16.0.0<16.11.5 | |
GitLab | >=17.0.0<17.0.3 | |
GitLab | >=17.0.0<17.0.3 | |
GitLab | =17.1.0 | |
GitLab | =17.1.0 |
Upgrade to versions 17.1.1, 17.0.3, 16.11.5 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3115 is categorized as a moderate severity vulnerability.
To address CVE-2024-3115, upgrade to GitLab versions 16.11.5, 17.0.3, or 17.1.1 or later.
CVE-2024-3115 affects GitLab versions from 16.0 to before 16.11.5, 17.0 to before 17.0.3, and specifically 17.1.0.
CVE-2024-3115 allows an attacker to access issues and epics without having an SSO session using Duo Chat.
If an upgrade is not possible, review access controls and consider temporarily disabling affected features until a patch can be applied.