SB2024112714 - Multiple vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)
Published: November 27, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Missing Authorization (CVE-ID: CVE-2024-8114)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to missing authorization within LFS Tokens, which leads to security restrictions bypass and privilege escalation.
2) Inefficient Algorithmic Complexity (CVE-ID: CVE-2024-8237)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to inefficient algorithmic complexity. A remote user can use a specially crafted cargo.toml file and cause a denial of service condition on the target system.
3) Incorrect authorization (CVE-ID: CVE-2024-11669)
The vulnerability allows a remote user to bypass authorization checks.
The vulnerability exists due to overly broad application of token scopes. A remote administrator can gain unauthorized access to sensitive data.
4) Input validation error (CVE-ID: CVE-2024-8177)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within Harbor registry integration. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
5) Insufficient Session Expiration (CVE-ID: CVE-2024-11668)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient session expiration issue. A remote user can gain unauthorized access to streaming results.
6) Resource exhaustion (CVE-ID: CVE-2024-11828)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within test_report API calls. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://gitlab.com/gitlab-org/gitlab/-/issues/480494
- https://hackerone.com/reports/2649822
- https://gitlab.com/gitlab-org/gitlab/-/issues/480900
- https://hackerone.com/reports/2648665
- https://gitlab.com/gitlab-org/gitlab/-/issues/501528
- https://gitlab.com/gitlab-org/gitlab/-/issues/480706
- https://hackerone.com/reports/2637996
- https://gitlab.com/gitlab-org/gitlab/-/issues/456922
- https://gitlab.com/gitlab-org/gitlab/-/issues/443559
- https://hackerone.com/reports/2380264