First published: Thu Aug 08 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9 before 17.0.6, all versions starting from 17.1 before 17.1.4, all versions starting from 17.2 before 17.2.2. Under certain conditions, access tokens may have been logged when an API request was made in a specific manner.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.9<17.0.6 | |
GitLab | >=13.9<17.0.6 | |
GitLab | >=17.1.0<17.1.4 | |
GitLab | >=17.1.0<17.1.4 |
Upgrade to versions 17.2.2, 17.1.4, 17.0.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7554 is considered a high severity vulnerability affecting GitLab instances.
To fix CVE-2024-7554, update your GitLab installation to version 17.0.6 or newer, or 17.1.4 or newer, as applicable.
CVE-2024-7554 affects GitLab CE/EE versions from 13.9 up to 17.0.6, and 17.1 from 17.1.0 up to 17.1.4.
CVE-2024-7554 involves the potential for access tokens to be logged when an API request is made under certain conditions.
While not classified as critical, CVE-2024-7554 poses significant risks due to the exposure of access tokens.