Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)



Risk Low
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2024-5067
CVE-2024-7057
CVE-2024-0231
CWE-ID CWE-79
CWE-200
CWE-99
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Gitlab Community Edition
Universal components / Libraries / Software for developers

GitLab Enterprise Edition
Universal components / Libraries / Software for developers

Vendor GitLab, Inc

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Cross-site scripting

EUVDB-ID: #VU94721

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within the Maven Dependency Proxy. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 16.6.0 - 17.2.0

GitLab Enterprise Edition: 16.6.0 - 17.2.0

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/24/patch-release-gitlab-17-2-1-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU94723

Risk: Low

CVSSv3.1: 3.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can disclose limited information of an exported group or project.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 15.6.0 - 17.2.0

GitLab Enterprise Edition: 15.6.0 - 17.2.0

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/24/patch-release-gitlab-17-2-1-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU94717

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-5067

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to project level analytics settings leaked in DOM. A remote administrator can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

GitLab Enterprise Edition: 16.11.0 - 17.2.0

CPE2.3 External links

http://gitlab.com/gitlab-org/gitlab/-/issues/458504
http://gitlab.com/gitlab-org/gitlab/-/issues/462427
http://hackerone.com/reports/2462303
http://hackerone.com/reports/2502047


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information disclosure

EUVDB-ID: #VU94718

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-7057

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the reports can access and download job artifacts despite use of settings to prevent it. A remote user can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 16.7.0 - 17.2.0

GitLab Enterprise Edition: 16.7.0 - 17.2.0

CPE2.3 External links

http://gitlab.com/gitlab-org/gitlab/-/issues/458501
http://hackerone.com/reports/2475135


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper Control of Resource Identifiers ('Resource Injection')

EUVDB-ID: #VU94719

Risk: Low

CVSSv3.1: 2.4 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0231

CWE-ID: CWE-99 - Improper Control of Resource Identifiers ('Resource Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to improper control of a resource identifier. A remote administrator can craft a repository import in such a way as to misdirect commits.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 12.0.0 - 17.2.0

GitLab Enterprise Edition: 12.0.0 - 17.2.0

CPE2.3 External links

http://gitlab.com/gitlab-org/gitlab/-/issues/437103
http://hackerone.com/reports/2299337


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Information disclosure

EUVDB-ID: #VU94724

Risk: Low

CVSSv3.1: 2.3 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can view the resultant export.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Gitlab Community Edition: 15.4.0 - 17.2.0

GitLab Enterprise Edition: 15.4.0 - 17.2.0

CPE2.3 External links

http://about.gitlab.com/releases/2024/07/24/patch-release-gitlab-17-2-1-released/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###