SB2024091269 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)



SB2024091269 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)

Published: September 12, 2024

Security Bulletin ID SB2024091269
Severity
Medium
Patch available
YES
Number of vulnerabilities 17
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 65% Low 35%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 17 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-8631)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions. A remote administrator can edit custom role to gain other permissions.


2) Information disclosure (CVE-ID: CVE-2024-6685)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can gain unauthorized access to group runners information.


3) Spoofing attack (CVE-ID: CVE-2024-6446)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to the user application can spoof the redirect url. A remote user can use a specially crafted URL to trick a victim to trust an attacker controlled application.


4) Cleartext storage of sensitive information (CVE-ID: CVE-2024-4472)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to dependency proxy credentials are Logged in plaintext in graphql Logs. A local attacker can gain access to sensitive information.


5) Information disclosure (CVE-ID: CVE-2024-6389)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application within release atom endpoint for guest users. A remote user can gain unauthorized access to sensitive information on the system.


6) Information disclosure (CVE-ID: CVE-2024-5435)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application when repository mirroring fails. A remote administrator can gain unauthorized access to sensitive information on the system.


7) Information disclosure (CVE-ID: CVE-2024-2743)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can modify an on-demand DAST scan without permissions and leak variables.


8) Open redirect (CVE-ID: CVE-2024-4612)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in release permanent links. A remote user can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow for an account takeover by breaking the OAuth flow.


9) Open redirect (CVE-ID: CVE-2024-4283)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in repo/tree/:id endpoint. A remote user can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow for an account takeover by breaking the OAuth flow.


10) Information disclosure (CVE-ID: CVE-2024-4660)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user can read the source code of a private project by using group templates.


11) Security features bypass (CVE-ID: CVE-2024-8311)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to variables from settings are not overwritten by PEP if a template is included. A remote user can bypass variable overwrite protection via inclusion of a CI/CD template.


12) Improper access control (CVE-ID: CVE-2024-8641)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user with a victim's CI_JOB_TOKEN can obtain a GitLab session token belonging to the victim.


13) Input validation error (CVE-ID: CVE-2024-8124)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the "glm_source" parameter. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


14) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2024-8635)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in Dependency Proxy. A remote user can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


15) Command Injection (CVE-ID: CVE-2024-8640)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in Product Analytics funnels YAML. A remote user can pass specially crafted data to the application and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


16) Improper access control (CVE-ID: CVE-2024-6678)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can trigger a pipeline as an arbitrary user under certain circumstances.


17) Input validation error (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote user can squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.


Remediation

Install update from vendor's website.