
25/4/2024

12/12/2024
CVE-2024-4024: Authentication Bypass by Assumed-Immutable Data in GitLab
First published: Thu Apr 25 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.8 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker with their Bitbucket account credentials may be able to take over a GitLab account linked to another user's Bitbucket account, if Bitbucket is used as an OAuth 2.0 provider on GitLab.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|
GitLab | >=7.8.0<16.9.6 | |
GitLab | >=7.8.0<16.9.6 | |
GitLab | >=16.10.0<16.10.4 | |
GitLab | >=16.10.0<16.10.4 | |
GitLab | =16.11.0 | |
GitLab | =16.11.0 | |
Remedy
Upgrade to versions 16.9.6, 16.10.4 or 16.11.1 or above
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-4024?
CVE-2024-4024 has been classified as a medium severity vulnerability due to the potential for unauthorized access under certain conditions.
How do I fix CVE-2024-4024?
To fix CVE-2024-4024, upgrade your GitLab instance to version 16.9.6 or later, or to 16.10.4 or later, depending on your current version.
Which versions of GitLab are affected by CVE-2024-4024?
CVE-2024-4024 affects GitLab versions from 7.8 to 16.9.6, from 16.10 to 16.10.4, and specifically version 16.11.0.
Can an attacker exploit CVE-2024-4024 without credentials?
No, an attacker would need to have valid Bitbucket account credentials to exploit CVE-2024-4024.
What components of GitLab are impacted by CVE-2024-4024?
CVE-2024-4024 impacts both GitLab Community Edition and Enterprise Edition.
- agent/remedy
- agent/references
- agent/description
- agent/first-publish-date
- agent/type
- agent/author
- agent/event
- collector/epss-latest
- source/FIRST
- agent/epss
- collector/mitre-cve
- source/MITRE
- agent/title
- agent/weakness
- agent/severity
- agent/last-modified-date
- agent/softwarecombine
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/gitlab
- canonical/gitlab
- version/gitlab/7.8.0
- version/gitlab/16.10.0
- version/gitlab/16.11.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203