Cyber Posture

CVE-2024-9870

MediumPublic PoC

Published: 12 February 2025

Published
12 February 2025
Modified
06 August 2025
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0003 7.5th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Description

An external service interaction vulnerability in GitLab EE affecting all versions from 15.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send requests from the GitLab server to unintended services.

Security Summary

CVE-2024-9870 is an external service interaction vulnerability in GitLab Enterprise Edition (EE), affecting all versions from 15.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2. Classified under CWE-441 (Unintended Proxy or Intermediary) and CWE-918 (Server-Side Request Forgery), it allows an attacker to cause the GitLab server to send requests to unintended services. The vulnerability received a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) and was published on 2025-02-12.

A low-privileged authenticated user (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation tricks the GitLab server into making unauthorized outbound requests to external services, resulting in low confidentiality impact (C:L) within the unchanged security scope (S:U), with no integrity or availability effects.

Mitigation requires upgrading to GitLab EE 17.6.5, 17.7.4, 17.8.2, or later versions, as indicated by the affected version ranges. Official advisories are available in the GitLab issue tracker at https://gitlab.com/gitlab-org/gitlab/-/issues/498911 and the HackerOne disclosure report at https://hackerone.com/reports/2734142.

Details

CWE(s)
CWE-441CWE-918

Affected Products

gitlab
gitlab
15.11.0 — 17.6.5 · 17.7.0 — 17.7.4 · 17.8.0 — 17.8.2

References