Article Details
Scrape Timestamp (UTC): 2024-07-10 20:12:19.330
Original Article Text
Click to Toggle View
GitLab: Critical bug lets attackers run pipelines as other users. GitLab warned today that a critical vulnerability in its product's GitLab Community and Enterprise editions allows attackers to run pipeline jobs as any other user. The GitLab DevSecOps platform has over 30 million registered users and is used by over 50% of Fortune 100 companies, including T-Mobile, Goldman Sachs, Airbus, Lockheed Martin, Nvidia, and UBS. The flaw patched in today's security update is tracked as CVE-2024-6385, and it received a CVSS base score severity rating of 9.6 out of 10. It impacts all GitLab CE/EE versions from 15.8 to 16.11.6, 17.0 to 17.0.4, and 17.1 to 17.1.2. Under certain circumstances that GitLab has yet to disclose, attackers can exploit it to trigger a new pipeline as an arbitrary user. GitLab pipelines are a Continuous Integration/Continuous Deployment (CI/CD) system feature that lets users automatically run processes and tasks in parallel or sequentially to build, test, or deploy code changes. The company released GitLab Community and Enterprise versions 17.1.2, 17.0.4, and 16.11.6 to address this critical security flaw and advised all admins to upgrade all installations immediately. "We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible," it warned. "GitLab.com and GitLab Dedicated are already running the patched version." Account takeover flaw actively exploited in attacks GitLab patched an almost identical vulnerability (tracked as CVE-2024-5655) in late June, which could also be exploited to run pipelines as other users. One month earlier, it fixed a high-severity vulnerability (CVE-2024-4835) that enables unauthenticated threat actors to take over accounts in cross-site scripting (XSS) attacks. As CISA warned in May, threat actors are also actively exploiting another zero-click GitLab vulnerability (CVE-2023-7028) patched in January. This vulnerability allows unauthenticated attackers to hijack accounts via password resets. While Shadowserver found over 5,300 vulnerable GitLab instances exposed online in January, less than half (1,795) are still reachable today. Attackers target GitLab because it hosts various types of sensitive corporate data, including API keys and proprietary code, leading to significant security impact following a breach. This includes supply chain attacks if the threat actors insert malicious code in CI/CD (Continuous Integration/Continuous Deployment) environments, compromising the breached organization's repositories.
Daily Brief Summary
GitLab announced a critical security vulnerability in its Community and Enterprise editions, potentially allowing attackers to execute pipeline jobs as other users.
The issue affects GitLab versions 15.8 through 17.1.2 and has a high severity rating of 9.6 on the CVSS scale.
Immediate patches released for versions 17.1.2, 17.0.4, and 16.11.6, with GitLab urging all users to update their installations as soon as possible.
Mitigated versions are already deployed on GitLab.com and GitLab Dedicated, securing these platforms against the vulnerability.
This flaw follows closely after other serious GitLab vulnerabilities, including an account takeover bug and another that could allow pipeline impersonation, highlighting ongoing security challenges.
The exploitation of such vulnerabilities can lead to significant consequences, such as unauthorized access to sensitive corporate data and potential supply chain attacks.
GitLab is a critical infrastructure for many Fortune 100 companies, making it a high-value target for cyberattacks.