CVE-2024-8754

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-8754
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8754.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8754
Aliases
Downstream
Published
2024-09-12T17:02:00.988Z
Modified
2025-12-05T08:56:01.475601Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
External Control of Critical State Data in GitLab
Details

An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.

Database specific
{
    "cwe_ids": [
        "CWE-642"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/8xxx/CVE-2024-8754.json",
    "cna_assigner": "GitLab"
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.9.7"
        },
        {
            "fixed": "17.1.7"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "17.2"
        },
        {
            "fixed": "17.2.5"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "17.3"
        },
        {
            "fixed": "17.3.2"
        }
    ]
}

Affected versions

v17.*

v17.2.0-ee
v17.2.1-ee
v17.2.2-ee
v17.2.4-ee
v17.3.0-ee
v17.3.1-ee