Cyber Posture

CVE-2024-9773

LowPublic PoC

Published: 27 March 2025

Published
27 March 2025
Modified
13 August 2025
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
EPSS Score 0.0004 10.8th percentile
Risk Priority 7 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-9773 is a low-severity Command Injection (CWE-77) vulnerability in Gitlab Gitlab. Its CVSS base score is 3.7 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious Copy and Paste (T1204.004); ranked at the 10.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious Copy and Paste (T1204.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces validation of inputs to the Harbor registry integration, preventing command injection (CWE-77) in generated CLI commands.

prevent

Filters malicious code from CLI commands before display in the GitLab UI, mitigating the risk of users executing injected commands.

prevent

Mandates timely flaw remediation by upgrading GitLab EE to patched versions, eliminating the input validation vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1204.004 Malicious Copy and Paste Execution
An adversary may rely upon a user copying and pasting code in order to gain execution.
Why these techniques?

The command injection vulnerability in displayed CLI commands directly enables attackers to tamper with commands that users copy and paste for execution, mapping to T1204.004 Malicious Copy and Paste.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An issue was discovered in GitLab EE affecting all versions starting from 14.9 before 17.8.6, all versions starting from 17.9 before 17.8.3, all versions starting from 17.10 before 17.10.1. An input validation issue in the Harbor registry integration could have…

more

allowed a maintainer to add malicious code to the CLI commands shown in the UI.

Deeper analysisAI

CVE-2024-9773 is an input validation issue in the Harbor registry integration within GitLab Enterprise Edition (EE). It affects all versions starting from 14.9 before 17.8.6, all versions starting from 17.9 before 17.8.3, and all versions starting from 17.10 before 17.10.1. Classified as CWE-77 (command injection), the vulnerability carries a CVSS v3.1 base score of 3.7 (AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N) and was published on 2025-03-27.

A maintainer with sufficient privileges could exploit this issue to inject malicious code into CLI commands displayed in the GitLab UI. Exploitation requires local access, high attack complexity, and user interaction, such as another user copying and executing the tampered CLI commands on their system. Successful exploitation could result in low-impact confidentiality and integrity violations.

Mitigation details are available in the referenced advisories, including the GitLab issue at https://gitlab.com/gitlab-org/gitlab/-/issues/498557 and the HackerOne report at https://hackerone.com/reports/2671808, which align with upgrading to the specified patched versions beyond the affected ranges.

Details

CWE(s)

Affected Products

gitlab
gitlab
17.10.0 · 14.9.0 — 17.8.6 · 17.9.0 — 17.9.3

CVEs Like This One

CVE-2024-8402Same product: Gitlab Gitlab
CVE-2026-1092Same product: Gitlab Gitlab
CVE-2025-12664Same product: Gitlab Gitlab
CVE-2026-3988Same product: Gitlab Gitlab
CVE-2025-14513Same product: Gitlab Gitlab
CVE-2024-9870Same product: Gitlab Gitlab
CVE-2025-7659Same product: Gitlab Gitlab
CVE-2025-2242Same product: Gitlab Gitlab
CVE-2025-0314Same product: Gitlab Gitlab
CVE-2025-6948Same product: Gitlab Gitlab

References