First published: Mon Sep 16 2024(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.1.0<17.1.7 | |
GitLab | >=17.2.0<17.2.5 | |
GitLab | >=17.3.0<17.3.2 |
Upgrade to versions 17.1.7, 17.2.5, 17.3.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4283 has a high severity due to the potential for account takeover through the exploitation of the open redirect vulnerability.
To fix CVE-2024-4283, upgrade GitLab EE to version 17.1.7 or later, 17.2.5 or later, or 17.3.2 or later.
CVE-2024-4283 affects GitLab EE versions from 11.1 to below 17.1.7, from 17.2 to below 17.2.5, and from 17.3 to below 17.3.2.
CVE-2024-4283 is classified as an open redirect vulnerability, which can lead to account takeover.
Exploitation of CVE-2024-4283 may require specific conditions to be met, including the redirection of users during an OAuth flow.