GitLab fixes several vulnerabilities including CVE-2024-6678 

GitLab fixes several vulnerabilities including CVE-2024-6678 


GitLab has released critical security patches for its Community Edition (CE) and Enterprise Edition (EE) that could allow an attacker to execute arbitrary code.

Vulnerability details

CVE-2024-6678 with a CVSS score of 9.9,  affects all GitLab CE/EE versions starting from 8.14 up to the patched versions. This flaw allows an attacker to execute pipeline jobs as an arbitrary user under certain conditions. This command injection vulnerability could lead to full system compromise by enabling unauthorized pipeline executions with elevated privileges.

CVE-2024-8640 with a CVSS score of 8.5 , was discovered in GitLab EE versions 16.11 and above. In this vulnerability, attackers could inject malicious commands into the Product Analytics funnels YAML configuration due to incomplete input filtering. This code injection vulnerability could be exploited by attackers to execute unauthorized commands on connected Cube servers.

Advertisements

CVE-2024-8635 with a CVSS score of 7.7, affects GitLab EE versions 16.8 and later. The flaw allows attackers to craft custom Maven Dependency Proxy URLs to make unauthorized requests to internal resources. This could be leveraged for reconnaissance and further attacks on internal network resources.

CVE-2024-8124 with a CVSS score of 7.5, affects GitLab CE/EE versions starting from 16.4. By sending an excessively large glm_source parameter, an attacker could cause GitLab services to become unavailable, disrupting access to essential features.

GitLab strongly advises all self-managed installations to immediately upgrade to the latest versions to protect against these vulnerabilities. GitLab.com users are already protected, as the platform is running the patched versions, and GitLab Dedicated customers do not need to take action. For those running affected versions, upgrading to 17.3.217.2.5, or 17.1.7 is critical to maintaining the security and integrity of your GitLab environment.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.