Article Details

Scrape Timestamp (UTC): 2024-01-30 16:24:48.261

Source: https://thehackernews.com/2024/01/urgent-upgrade-gitlab-critical.html

Original Article Text

Click to Toggle View

URGENT: Upgrade GitLab - Critical Workspace Creation Flaw Allows File Overwrite. GitLab once again released fixes to address a critical security flaw in its Community Edition (CE) and Enterprise Edition (EE) that could be exploited to write arbitrary files while creating a workspace. Tracked as CVE-2024-0402, the vulnerability has a CVSS score of 9.9 out of a maximum of 10. "An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 prior to 16.5.8, 16.6 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 which allows an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace," GitLab said in an advisory released on January 25, 2024. The company also noted patches for the bug have been backported to 16.5.8, 16.6.6, 16.7.4, and 16.8.1. Also resolved by GitLab are four medium-severity flaws that could lead to a regular expression denial-of-service (ReDoS), HTML injection, and the disclosure of a user's public email address via the tags RSS feed. The latest update arrives two weeks after the DevSecOps platform shipped fixes to close out two critical shortcomings, including one that could be exploited to take over accounts without requiring any user interaction (CVE-2023-7028, CVSS score: 10.0). Users are advised to upgrade the installations to a patched version as soon as possible to mitigate potential risks. GitLab.com and GitLab Dedicated environments are already running the latest version. Webinar: Decoding the 2024 Customer Data Platform Report Explore the trends, challenges, and opportunities shaping the future of customer data management.

Daily Brief Summary

CYBERCRIME // Critical Security Patch Released for GitLab File Overwrite Flaw

GitLab has issued an urgent update to address a critical flaw with a CVSS score of 9.9, affecting multiple versions of its CE and EE.

The vulnerability, identified as CVE-2024-0402, enables authenticated users to write files arbitrarily on the GitLab server during workspace creation.

The patched versions include GitLab 16.5.8, 16.6.6, 16.7.4, and 16.8.1, among others.

The latest security update also fixes four medium-severity issues related to ReDoS, HTML injection, and email address disclosure.

This release comes on the heels of previous critical security updates, emphasizing the need for users to upgrade to the latest patched versions immediately.

GitLab.com and dedicated GitLab environments have already been updated to these secured versions.

The article concludes by highlighting an upcoming webinar on the 2024 Customer Data Platform Report, unrelated to the security fixes.