First published: Thu Sep 12 2024(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.9.0<17.1.7 | |
GitLab | >=17.2.0<17.2.5 | |
GitLab | >=17.3.0<17.3.2 |
Upgrade to versions 17.3.2, 17.2.5, 17.1.7 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4612 has been classified as a high severity vulnerability due to its potential for account takeover.
To fix CVE-2024-4612, upgrade GitLab to version 17.1.7 or later, or to version 17.2.5 or later, or to version 17.3.2 or later.
CVE-2024-4612 affects GitLab EE versions from 12.9 to 17.1.6, from 17.2.0 to 17.2.4, and from 17.3.0 to 17.3.1.
CVE-2024-4612 is classified as an open redirect vulnerability that can compromise the OAuth flow leading to account takeover.
Users of GitLab EE who are using the affected versions are at risk of exploitation through CVE-2024-4612.