Site icon TheCyberThrone

Gitlab addresses Several Vulnerabilities -June 2024

Advertisements

GitLab, has released critical updates for both its Community Edition (CE) and Enterprise Edition (EE). The new versions, 17.1.1, 17.0.3, and 16.11.5, contain essential security and bug fixes. GitLab urges all users to upgrade immediately to protect their installations from potential exploits.

Run Pipelines as Any User

This vulnerability tracked as CVE-2024-5655 with a CVSS score of 9.6, allows attackers to trigger pipelines as another user under specific conditions, posing a significant security risk. The patch alters the Merge Request (MR) re-targeting workflow, requiring users to manually start pipelines when a target branch is merged. The GraphQL authentication using CI_JOB_TOKEN is now disabled by default, requiring alternative authentication methods.

Advertisements

Stored XSS in Imported Project’s Commit Notes

This vulnerability tracked as CVE-2024-4901 with a CVSS score of 8.7 involves a stored Cross-Site Scripting (XSS) vulnerability. This flaw can be exploited through malicious commit notes in imported projects, affecting versions from 16.9 onwards. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the user’s session.

CSRF on GraphQL API IntrospectionQuery

This vulnerability tracked as CVE-2024-4994 with a CVSS score of 8.1, allows attackers to execute arbitrary GraphQL mutations, potentially leading to unauthorized actions within the GitLab instance.

Other vulnerabilities fix as given below.

Advertisements

While GitLab has not found evidence of these vulnerabilities being exploited in the wild, the critical nature of these flaws necessitates immediate action. Users of GitLab CE and EE are strongly advised to upgrade to versions 17.1.1, 17.0.3, or 16.11.5 without delay to ensure the security and integrity of their installations.

Exit mobile version