First published: Wed Jun 12 2024(Updated: )
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 16.10.7, all versions starting from 16.11 before 16.111.4, all versions starting from 17.0 before 17.0.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=5.1<16.10.7 | |
GitLab | >=5.1<16.10.7 | |
GitLab | >=16.11.0<16.111.4 | |
GitLab | >=16.11.0<16.111.4 | |
GitLab | >=17.0.0<17.0.2 | |
GitLab | >=17.0.0<17.0.2 |
Upgrade to versions 16.10.7, 16.11.4, 17.0.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4201 has been classified as a cross-site scripting vulnerability affecting multiple versions of GitLab.
To fix CVE-2024-4201, you should upgrade to GitLab version 16.10.7 or later, 16.111.4 or later, or 17.0.2.
CVE-2024-4201 affects GitLab versions from 5.1 to 16.10.6, from 16.11.0 to 16.111.3, and from 17.0.0 to 17.0.1.
Yes, CVE-2024-4201 can be exploited remotely by crafting malicious XML files that are viewed in raw mode.
CVE-2024-4201 can lead to cross-site scripting attacks, potentially allowing attackers to execute scripts in the user's browser.