First published: Thu Dec 12 2024(Updated: )
An issue was discovered in GitLab CE/EE affecting all versions from 11.8 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could potentially perform an open redirect against a given releases API endpoint.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >11.8 | |
GitLab | <17.4.6 | |
GitLab Enterprise Edition | >17.5 | |
GitLab Enterprise Edition | <17.5.4 | |
GitLab Enterprise Edition | >17.6 | |
GitLab Enterprise Edition | <17.6.2 |
Upgrade to versions 17.4.6, 17.5.4, 17.6.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9387 has been classified as a vulnerability that allows open redirects, which can lead to phishing attacks or unauthorized access.
To fix CVE-2024-9387, upgrade your GitLab installation to a version that is at least 17.4.6, 17.5.4, or 17.6.2, depending on your current version.
CVE-2024-9387 affects GitLab CE from version 11.8 up to but not including 17.4.6, and GitLab EE from 17.5 before 17.5.4 and 17.6 before 17.6.2.
CVE-2024-9387 can allow attackers to perform open redirects which can be utilized for phishing or redirecting users to malicious sites.
No, CVE-2024-9387 is not present in GitLab versions 17.4.6 and later, 17.5.4 and later, or 17.6.2 and later.