First published: Wed Jul 24 2024(Updated: )
An issue was discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where certain project-level analytics settings could be leaked in DOM to group members with Developer or higher roles.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.11<17.0.5 | |
GitLab | >=17.1<17.1.3 | |
GitLab | >=17.2<17.2.1 |
Upgrade to versions 17.0.5, 17.1.3, 17.2.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5067 is considered a medium severity vulnerability due to the potential for disclosure of sensitive project-level analytics.
To fix CVE-2024-5067, upgrade GitLab to version 17.0.5 or later, 17.1.3 or later, or 17.2.1 or later.
CVE-2024-5067 affects all users of GitLab EE versions from 16.11 up to but not including 17.0.5, from 17.1 up to but not including 17.1.3, and from 17.2 up to but not including 17.2.1.
The potential impacts of CVE-2024-5067 include unauthorized access to leaked project-level analytics settings by group members with Developer or higher roles.
Yes, CVE-2024-5067 can be exploited remotely by users with the appropriate access levels within GitLab.