Gitlab fixes multiple vulnerabilities including CVE-2024-8114

Gitlab fixes multiple vulnerabilities including CVE-2024-8114


GitLab has released patches to address multiple vulnerabilities affecting its Community Edition (CE) and Enterprise Edition (EE) products. Versions 17.6.1, 17.5.3, and 17.4.5 could allow privilege escalation, denial of service and exposure of sensitive data.

The most severe vulnerability, identified as CVE-2024-8114 with a CVSS score of 8.2, could allow an attacker with access to a victim’s Personal Access Token (PAT) to escalate privileges.

The second vulnerability tracked as CVE-2024-8237 with a CVSS Score of 6.5, attacker could cause a denial of service with a crafted cargo.toml file

Advertisements

The third  vulnerability tracked as CVE-2024-11669 with a CVSS score of 6.5, could allow unauthorized access to sensitive data via scoped tokens

The fourth vulnerability tracked as CVE-2024-11828 with a CVSS Score of 4.3 that could allow an attacker to create a DoS condition by sending crafted API calls

The final vulnerability tracked as CVE-2024-11668 with a CVSS score of 4.2 that could allow long-lived connections to bypass authentication controls

Advertisements

GitLab has credited security researchers pwnie, l33thaxor, a92847865, and luryus for reporting some of these vulnerabilities through its HackerOne bug bounty program. Internal GitLab team members Dylan Griffith and Heinrich Lee Yu were also credited with discovering vulnerabilities.

GitLab urges all users to update their installations to the latest versions immediately to mitigate these security risks.

For more information, refer to the advisory

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.