First published: Thu Aug 08 2024(Updated: )
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 prior 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=5.1.0<17.0.6 | |
GitLab | >=17.1.0<17.1.4 |
Upgrade to versions 17.2.2, 17.1.4, 17.0.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-4207 has been categorized as medium, due to the potential for cross-site scripting attacks.
To fix CVE-2024-4207, upgrade your GitLab installation to version 17.0.6 or later, 17.1.4 or later, or 17.2.2 or later.
CVE-2024-4207 affects all versions of GitLab starting from 5.1 before 17.0.6, starting from 17.1 before 17.1.4, and starting from 17.2 before 17.2.2.
CVE-2024-4207 is a cross-site scripting (XSS) vulnerability allowing malicious scripts to be executed in the context of the user’s session.
Yes, CVE-2024-4207 can be exploited remotely by an attacker through the manipulation of XML file views in GitLab.