First published: Thu May 09 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2 where abusing the API to filter branch and tags could lead to Denial of Service.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.4.0<16.9.7 | |
GitLab | >=15.4.0<16.9.7 | |
GitLab | >=16.10.0<16.10.5 | |
GitLab | >=16.10.0<16.10.5 | |
GitLab | >=16.11.0<16.11.2 | |
GitLab | >=16.11.0<16.11.2 |
Upgrade to versions 16.9.7, 16.10.5, 16.11.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4539 is classified as a Denial of Service vulnerability affecting GitLab versions.
To remediate CVE-2024-4539, users should upgrade GitLab to versions 16.9.7, 16.10.5, or 16.11.2 or later.
CVE-2024-4539 affects GitLab versions from 15.4 to 16.9.6, from 16.10.0 to 16.10.4, and from 16.11.0 to 16.11.1.
CVE-2024-4539 is caused by an issue in the GitLab API that can be abused to filter branches and tags, leading to a Denial of Service.
There are no official workarounds for CVE-2024-4539; users are recommended to upgrade to secure versions.