SB2020021003 - Multiple vulnerabilities in GitLab Enterprise Edition



SB2020021003 - Multiple vulnerabilities in GitLab Enterprise Edition

Published: February 10, 2020 Updated: February 10, 2020

Security Bulletin ID SB2020021003
Severity
Medium
Patch available
YES
Number of vulnerabilities 14
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 79% Low 21%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 14 secuirty vulnerabilities.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2020-7976)

The vulnerability allows a remote attacker to gain access to sensitive information on the target system.

The vulnerability exists due to the Grafana token is displayed in plaintext on the settings page. A remote attacker can obtain sensitive information on the target system.

2) Incorrect default permissions (CVE-ID: CVE-2020-7977)

The vulnerability allows a emote attacker to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A remote developer of a project can change the pipeline status of a protected branch to any value.


3) Information disclosure (CVE-ID: CVE-2020-7974)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the last pipeline status is visible via the commits API. A remote attacker can gain unauthorized access to sensitive information on the system.


4) Input validation error (CVE-ID: CVE-2020-7978)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in AsciiDoc. A remote attacker can use certain payloads and cause a denial of service condition on the target system.


5) Information disclosure (CVE-ID: CVE-2020-7969)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to Unexpired Todos could be leveraged to disclose (potentially confidential) issues and merge requests. A remote attacker can gain unauthorized access to sensitive information on the system.


6) Information disclosure (CVE-ID: CVE-2020-7979)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to GraphQL queries may expose under certain conditions private project names. A remote attacker can gain unauthorized access to sensitive information on the system.


7) Improper access control (CVE-ID: CVE-2020-7968)

The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.

The vulnerability exists due to the authorization checks were not being applied in some cases for public repositories with merge request visibility set to members only. A remote attacker can disclose the Forked Private Project Source Code.


8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-7972)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to a certain API endpoint can be used to bypass email verification requirements. A remote attacker can view contents of files and directories or modify them.


9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-7967)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to an insecure permissions issue. A remote attacker can view activity counts of issues and merge requests.


10) Cross-site scripting (CVE-ID: CVE-2020-7971)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the create group functionality. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


11) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2020-6833)

The vulnerability allows a remote attacker to perform HTTP request smuggling attack.

The vulnerability exists due to a particular header can be used to override restrictions. A remote attacker can send a specially crafted HTTP request and perform HTTP request smuggling attack, resulting in the GitLab Workhorse disclosing packages and files in the /tpm directory.


12) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-8114)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the permissions are not being validated in the ProjectExportWorker for the user scheduling exports. A remote attacker can gain elevated privileges on the target system.


13) Path traversal (CVE-ID: CVE-2020-7966)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the dependency proxy. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.


14) Resource exhaustion (CVE-ID: CVE-2019-16892)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the data about the uncompressed size can be spoofed. A remote attacker can send a specially crafted ZIP file, bypass application checks on ZIP entry sizes, trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.