Vulnerability Description
A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 16.8.0, < 17.1.7 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/gitlab/-/issues/455273Broken Link
- https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-release
FAQ
What is CVE-2024-8635?
CVE-2024-8635 is a vulnerability with a CVSS score of 7.7 (HIGH). A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possibl...
How severe is CVE-2024-8635?
CVE-2024-8635 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8635?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.