Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)



Risk Medium
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2024-6385
CVE-2024-5257
CVE-2024-5470
CVE-2024-6595
CVE-2024-2880
CVE-2024-5528
CWE-ID CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Gitlab Community Edition
Universal components / Libraries / Software for developers

GitLab Enterprise Edition
Universal components / Libraries / Software for developers

Vendor GitLab, Inc

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU94092

Risk: Medium

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-6385

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and run pipeline jobs as an arbitrary user.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 15.8.0 - 17.1.1

GitLab Enterprise Edition: 15.8.0 - 17.1.1

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

EUVDB-ID: #VU94093

Risk: Low

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5257

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote administrator can bypass implemented security restrictions and modify the URL for a group namespace.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 17.0.0 - 17.1.1

GitLab Enterprise Edition: 17.0.0 - 17.1.1

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU94094

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5470

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote administrator can bypass implemented security restrictions and create project-level deploy tokens.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 17.0.0 - 17.1.1

GitLab Enterprise Edition: 17.0.0 - 17.1.1

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper access control

EUVDB-ID: #VU94095

Risk: Low

CVSSv3.1: 2.6 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-6595

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within Package registry. A remote user can bypass implemented security restrictions and upload an NPM package with conflicting package data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 11.8.0 - 17.1.1

GitLab Enterprise Edition: 11.8.0 - 17.1.1

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper access control

EUVDB-ID: #VU94096

Risk: Low

CVSSv3.1: 2.4 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-2880

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote administrator can bypass implemented security restrictions and ban group members.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 16.5.0 - 17.1.1

GitLab Enterprise Edition: 16.5.0 - 17.1.1

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper access control

EUVDB-ID: #VU94098

Risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5528

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can cause the subdomain takeover in GitLab Pages by checking if the domain is enabled every time the custom domain is resolved.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 0.1.5 - 17.1.1

GitLab Enterprise Edition: 12.0.6 - 17.1.1

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###