An XSS flaw in GitLabΒ allows attackers to take over accounts
GitLab addressed a high-severity cross-site scripting (XSS) vulnerability that allows unauthenticatedΒ attackers to take over user accounts.
GitLab fixed a high-severity XSS vulnerability, tracked asΒ CVE-2024-4835, that allows attackers to take over user accounts.
An attacker can exploit this issue by using a specially crafted page to exfiltrate sensitive user information.
The vulnerability impacts versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1.
The flaw was addressed with the release of versions 17.0.1, 16.11.3, and 16.10.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).
βA XSS condition exists within GitLab in versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1.β reads the advisory published by the company. βBy leveraging this condition, an attacker can craft a malicious page to exfiltrate sensitive user information.β
matanberΒ reported this vulnerability through our HackerOne bug bounty program, he received a $10,270 bounty.
Below is the list of vulnerabilities addressed by the company:
In early May, the U.S. Cybersecurity and Infrastructure Security Agency (CISA)Β addedΒ a GitLabΒ Community and Enterprise Editions improper access control vulnerability to itsΒ Known Exploited Vulnerabilities (KEV) catalog.
The issue, tracked asΒ CVE-2023-7028Β (CVSS score: 10.0), is an account takeover via Password Reset. The flaw can be exploited to hijack an account without any interaction.
Follow me on Twitter:Β @securityaffairsΒ andΒ FacebookΒ andΒ Mastodon
(SecurityAffairsΒ βΒ hacking, XSS)