SB2024112714 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE) 



SB2024112714 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)

Published: November 27, 2024

Security Bulletin ID SB2024112714
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Missing Authorization (CVE-ID: CVE-2024-8114)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to missing authorization within LFS Tokens, which leads to security restrictions bypass and privilege escalation.


2) Inefficient Algorithmic Complexity (CVE-ID: CVE-2024-8237)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to inefficient algorithmic complexity. A remote user can use a specially crafted cargo.toml file and cause a denial of service condition on the target system.


3) Incorrect authorization (CVE-ID: CVE-2024-11669)

The vulnerability allows a remote user to bypass authorization checks.

The vulnerability exists due to overly broad application of token scopes. A remote administrator can gain unauthorized access to sensitive data.


4) Input validation error (CVE-ID: CVE-2024-8177)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within Harbor registry integration. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


5) Insufficient Session Expiration (CVE-ID: CVE-2024-11668)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient session expiration issue. A remote user can gain unauthorized access to streaming results.


6) Resource exhaustion (CVE-ID: CVE-2024-11828)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources within test_report API calls. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.