First published: Thu Oct 10 2024(Updated: )
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=17.1.0<17.2.9 | |
GitLab | >=17.1.0<17.2.9 | |
GitLab | >=17.3.0<17.3.5 | |
GitLab | >=17.3.0<17.3.5 | |
GitLab | >=17.4.0<17.4.2 | |
GitLab | >=17.4.0<17.4.2 |
Upgrade to versions 17.4.2, 17.3.5, 17.2.9 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6530 has been classified with a severity rating that warrants immediate attention due to its potential impact on user security.
To fix CVE-2024-6530, update your GitLab instance to version 17.2.9 or later, 17.3.5 or later, or 17.4.2 or later.
CVE-2024-6530 affects all versions starting from 17.1 up to but not including 17.2.9, starting from 17.3 up to but not including 17.3.5, and starting from 17.4 up to but not including 17.4.2.
CVE-2024-6530 is a cross-site scripting (XSS) vulnerability that can allow attackers to execute arbitrary HTML and JavaScript in a user's browser.
Yes, if you are running an affected version of GitLab, CVE-2024-6530 can potentially be exploited by an attacker to manipulate the content rendered in user sessions.