Article Details
Scrape Timestamp (UTC): 2024-05-02 06:17:06.356
Source: https://thehackernews.com/2024/05/cisa-warns-of-active-exploitation-of.html
Original Article Text
Click to Toggle View
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email address. GitLab, which disclosed details of the shortcoming earlier this January, said it was introduced as part of a code change in version 16.1.0 on May 1, 2023. "Within these versions, all authentication mechanisms are impacted," the company noted at the time. "Additionally, users who have two-factor authentication enabled are vulnerable to password reset but not account takeover as their second authentication factor is required to login." Successful exploitation of the issue can have serious consequences as it not only enables an adversary to take control of a GitLab user account, but also steal sensitive information, credentials, and even poison source code repositories with malicious code, leading to supply chain attacks. "For instance, an attacker gaining access to the CI/CD pipeline configuration could embed malicious code designed to exfiltrate sensitive data, such as Personally Identifiable Information (PII) or authentication tokens, redirecting them to an adversary-controlled server," cloud security firm Mitiga said in a recent report. "Similarly, tampering with repository code might involve inserting malware that compromises system integrity or introduces backdoors for unauthorized access. Malicious code or abuse of the pipeline could lead to data theft, code disruption, unauthorized access, and supply chain attacks." The flaw has been addressed in GitLab versions 16.5.6, 16.6.4, and 16.7.2, with the patches also backported to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5. CISA has yet to provide any other details as to how the vulnerability is being exploited in real-world attacks. In light of active users, federal agencies are required to apply the latest fixes by May 22, 2024, to secure their networks.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reported active exploitation of a critical GitLab vulnerability.
Identified as CVE-2023-7028 with a CVSS score of 10.0, the flaw allows attackers to send password reset emails to unverified addresses, facilitating account takeovers.
Originally introduced in GitLab version 16.1.0, the vulnerability affects all authentication mechanisms, including those with two-factor authentication, though these accounts cannot be fully taken over.
Potential impacts of the exploit include unauthorized access to GitLab accounts, theft of sensitive data, and insertion of malicious code into source code repositories.
Successful attacks could compromise entire supply chains by manipulating CI/CD pipeline configurations or inserting malware.
Fixed versions of GitLab that address the vulnerability include 16.5.6, 16.6.4, 16.7.2, and backported versions for earlier releases.
CISA has mandated federal agencies to apply the patches by May 22, 2024, to mitigate risks associated with the vulnerability.