First published: Thu Nov 14 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.3 before 17.4.2, all versions starting from 17.5 before 17.5.4, all versions starting from 17.6 before 17.6.2. This issue allows an attacker to create a group with a name matching an existing unique Pages domain, potentially leading to domain confusion attacks.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.3.0<17.4.2 | |
GitLab | >=16.3.0<17.4.2 | |
GitLab | >=17.5.0<17.5.4 | |
GitLab | >=17.5.0<17.5.4 | |
GitLab | >=17.6.0<17.6.2 | |
GitLab | >=17.6.0<17.6.2 |
Upgrade to versions 17.6.2, 17.5.4, 17.4.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9633 has a medium severity level due to its potential impact on group naming and user privilege escalation.
To fix CVE-2024-9633, upgrade to GitLab versions 17.4.2, 17.5.4, or 17.6.2 or later.
CVE-2024-9633 affects all versions of GitLab from 16.3 to before 17.4.2, from 17.5 to before 17.5.4, and from 17.6 to before 17.6.2.
Yes, CVE-2024-9633 could allow attackers to create groups with names that can lead to unauthorized access or privilege escalation.
While there is no public exploit available for CVE-2024-9633, the issue itself poses a significant risk if not patched.