First published: Thu Aug 08 2024(Updated: )
An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.7.0<17.0.6 | |
GitLab | >=17.1.0<17.1.4 |
Upgrade to versions 17.2.2, 17.1.4, 17.0.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4784 has a high severity rating due to the potential for unauthorized policy approvals.
To fix CVE-2024-4784, upgrade your GitLab EE installation to version 17.0.6, 17.1.4, or 17.2.2 or later.
CVE-2024-4784 affects GitLab EE versions from 16.7 up to but not including 17.0.6, and versions from 17.1 up to but not including 17.1.4 and from 17.2 up to but not including 17.2.2.
CVE-2024-4784 does not involve remote exploitation as it requires authenticated access to GitLab EE.
CVE-2024-4784 could lead to significant security risks by allowing users to approve policies without proper password verification.