First published: Thu Sep 12 2024(Updated: )
An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.11.0<17.1.7 | |
GitLab | >=17.2.0<17.2.5 | |
GitLab | >=17.3.0<17.3.2 |
Upgrade to version 17.1.7, 17.2.5 or 17.3.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8640 has a medium severity rating due to the potential for command injection on the Cube server.
To fix CVE-2024-8640, upgrade your GitLab EE instance to version 17.1.7 or later, 17.2.5 or later, or 17.3.2 or later.
CVE-2024-8640 affects GitLab EE versions starting from 16.11 to versions prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2.
CVE-2024-8640 is a command injection vulnerability due to incomplete input filtering in GitLab EE.
As of now, there is no public report indicating that CVE-2024-8640 is being actively exploited in the wild.