Article Details
Scrape Timestamp (UTC): 2024-06-28 14:24:28.099
Source: https://thehackernews.com/2024/06/gitlab-releases-patch-for-critical-cicd.html
Original Article Text
Click to Toggle View
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others. GitLab has released security updates to address 14 security flaws, including one critical vulnerability that could be exploited to run continuous integration and continuous deployment (CI/CD) pipelines as any user. The weaknesses, which affect GitLab Community Edition (CE) and Enterprise Edition (EE), have been addressed in versions 17.1.1, 17.0.3, and 16.11.5. The most severe of the vulnerabilities is CVE-2024-5655 (CVSS score: 9.6), which could permit a malicious actor to trigger a pipeline as another user under certain circumstances. It impacts the following versions of CE and EE - GitLab said the fix introduces two breaking changes as a result of which GraphQL authentication using CI_JOB_TOKEN is disabled by default and pipelines will no longer run automatically when a merge request is re-targeted after its previous target branch is merged. Some of the other important flaws fixed as part of the latest release are listed below - While there is no evidence of active exploitation of the flaws, users are recommended to apply the patches to mitigate against potential threats. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.
Daily Brief Summary
GitLab has updated its software to address 14 different security vulnerabilities.
One particularly critical flaw (CVE-2024-5655) with a CVSS score of 9.6, could allow attackers to impersonate users and trigger CI/CD pipelines.
The vulnerabilities affected both the Community and Enterprise editions of GitLab, specifically versions: 17.1.1, 17.0.3, and 16.11.5.
Two significant changes include the disabling of GraphQL authentication using CI_JOB_TOKEN and preventing automatic pipeline runs on merge request retargeting.
There is currently no evidence of the vulnerabilities being exploited in the wild.
Users are strongly encouraged to install the latest patches to secure their systems against potential exploitation.