First published: Thu May 23 2024(Updated: )
A XSS condition exists within GitLab in versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1. By leveraging this condition, an attacker can craft a malicious page to exfiltrate sensitive user information.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.11.0<16.10.6 | |
GitLab | >=15.11.0<16.10.6 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | =17.0.0 | |
GitLab | =17.0.0 |
Upgrade to versions 16.10.6, 16.11.3, 17.0.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4835 has been classified as a high severity vulnerability due to its potential to exfiltrate sensitive user information.
To address CVE-2024-4835, upgrade GitLab to version 16.10.6 or later, 16.11.3 or later, or 17.0.1 or later.
CVE-2024-4835 affects GitLab versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1.
CVE-2024-4835 allows for Cross-Site Scripting (XSS) attacks, enabling attackers to craft malicious pages.
The impact of CVE-2024-4835 can lead to the exfiltration of sensitive user information, potentially compromising user accounts.