First published: Thu Jul 25 2024(Updated: )
A cross site scripting vulnerability exists in GitLab CE/EE affecting all versions from 16.6 prior to 17.0.5, 17.1 prior to 17.1.3, 17.2 prior to 17.2.1 allowing an attacker to execute arbitrary scripts under the context of the current logged in user.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.6.0<17.0.5 | |
GitLab | >=16.6.0<17.0.5 | |
GitLab | >=17.1.0<17.1.3 | |
GitLab | >=17.1.0<17.1.3 | |
GitLab | =7.2.0 | |
GitLab | =7.2.0 |
Upgrade to versions 17.0.5, 17.1.3, 17.2.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7047 is classified as a cross-site scripting vulnerability that can significantly impact user security in GitLab.
To fix CVE-2024-7047, upgrade your GitLab installation to versions 17.0.5, 17.1.3, or 17.2.1 or later.
CVE-2024-7047 affects GitLab CE/EE versions 16.6 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1.
Yes, CVE-2024-7047 can be exploited remotely by an attacker targeting the current logged-in user's session.
Attackers can execute arbitrary scripts in the context of the logged-in user, which may lead to data theft or unauthorized actions.