Site icon TheCyberThrone

Gitlab fixes Critical Vulnerabilities

Advertisements

GitLab has released security updates to address two critical vulnerabilities impacting both the Community and Enterprise Edition.

The most critical vulnerability, tracked as CVE-2023-7028 with a CVSS score 10, is an account takeover via Password Reset. The flaw can be exploited to hijack an account without any interaction.

Advertisements

The flaws impact the following versions:

Gitlab is not aware of attacks in the wild exploiting the vulnerability CVE-2023-7028. Self-managed customers are recommended to review their logs to check for possible attempts to exploit this vulnerability:

The second vulnerability, tracked as CVE-2023-5356 with a CVSS score 9.6, can be exploited by an attacker to abuse Slack/Mattermost integrations and execute slash commands as another user.

Advertisements

GitLab also addressed the following issues with the release of the version 16.7.2:

  1. CVE-2023-4812: Bypass CODEOWNERS approval removal.
  2. CVE-2023-6955: Improper access control for Workspaces.
  3. CVE-2023-2030: Commit signature validation ignores headers after signature.

Gitlab urges organizations to update their installations immediately

Exit mobile version