First published: Thu Oct 24 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 before 17.3.6, 17.4 before 17.4.3, and 17.5 before 17.5.1. An attacker could inject HTML into the Global Search field on a diff view leading to XSS.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.10.0<17.3.6 | |
GitLab | >=15.10.0<17.3.6 | |
GitLab | >=17.4.0<17.4.3 | |
GitLab | >=17.4.0<17.4.3 | |
GitLab | =17.5.0 | |
GitLab | =17.5.0 |
Upgrade to versions 17.3.6, 17.4.3, 17.5.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8312 is considered a moderate severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To fix CVE-2024-8312, upgrade to GitLab versions 17.3.6, 17.4.3, or 17.5.1 or later.
CVE-2024-8312 can be exploited to perform XSS attacks through the Global Search field in the GitLab diff view.
CVE-2024-8312 affects GitLab CE/EE versions from 15.10 before 17.3.6, 17.4 before 17.4.3, and 17.5 before 17.5.1.
Users of GitLab should immediately upgrade their installations to the patched versions to mitigate the risk posed by CVE-2024-8312.