First published: Wed Jun 26 2024(Updated: )
Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1 which allowed an attacker to cause resource exhaustion via banzai pipeline.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=1.0.0<16.11.5 | |
GitLab | >=1.0.0<16.11.5 | |
GitLab | >=17.0.0<17.0.3 | |
GitLab | >=17.0.0<17.0.3 | |
GitLab | =17.1.0 | |
GitLab | =17.1.0 |
Upgrade to versions 17.1.1, 17.0.3, 16.11.5 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4557 is considered a high severity vulnerability that allows multiple Denial of Service (DoS) conditions in GitLab.
To fix CVE-2024-4557, users should upgrade to GitLab version 16.11.5 or later, 17.0.3 or later, or 17.1.1 or later.
CVE-2024-4557 affects all versions of GitLab starting from 1.0 up to 16.11.5, 17.0 up to 17.0.3, and 17.1 up to 17.1.1.
CVE-2024-4557 allows an attacker to execute Denial of Service (DoS) attacks that can lead to resource exhaustion.
Yes, CVE-2024-4557 is applicable to both GitLab Community Edition (CE) and Enterprise Edition (EE) across the specified versions.