First published: Thu Nov 14 2024(Updated: )
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.0 prior to 17.3.7, starting from 17.4 prior to 17.4.4, and starting from 17.5 prior to 17.5.2, which could have allowed unauthorized access to the Kubernetes agent in a cluster under specific configurations.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=16.0.0<17.3.7 | |
GitLab | >=16.0.0<17.3.7 | |
GitLab | >=17.4.0<17.4.4 | |
GitLab | >=17.4.0<17.4.4 | |
GitLab | >=17.5.0<17.5.2 | |
GitLab | >=17.5.0<17.5.2 |
Upgrade to versions 17.3.7, 17.4.4, 17.5.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9693 has a medium severity rating due to its potential to allow unauthorized access to Kubernetes agents.
To fix CVE-2024-9693, upgrade GitLab to version 17.3.7 or higher, 17.4.4 or higher, or 17.5.2 or higher.
CVE-2024-9693 affects GitLab versions starting from 16.0 up to 17.3.7 and from 17.4.0 to 17.4.4, as well as from 17.5.0 to 17.5.2.
CVE-2024-9693 could allow unauthorized users to access the Kubernetes agent in specified cluster configurations.
There is no specific workaround for CVE-2024-9693; the best solution is to apply the recommended updates.