Article Details
Scrape Timestamp (UTC): 2024-09-12 14:50:13.779
Original Article Text
Click to Toggle View
GitLab warns of critical pipeline execution vulnerability. GitLab has released critical updates to address multiple vulnerabilities, the most severe of them (CVE-2024-6678) allowing an attacker to trigger pipelines as arbitrary users under certain conditions. The release is for versions 17.3.2, 17.2.5, and 17.1.7 for both GitLab Community Edition (CE) and Enterprise Edition (EE), and patches a total of 18 security issues as part of the bi-monthly (scheduled) security updates. With a critical severity score of 9.9, the CVE-2024-6678 vulnerability could enable an attacker to execute environment stop actions as the owner of the stop action job. The severity of the flaw comes from its potential for remote exploitation, lack of user interaction, and the low privileges required for exploiting it. GitLab warns that the issue affects CE/EE versions from 8.14 up to 17.1.7, versions from 17.2 prior to 17.2.5, and versions from 17.3 prior to 17.3.2. GitLab pipelines are automated workflows used to build, test, and deploy code, part of GitLab’s CI/CD (Continuous Integration/Continuous Delivery) system. They are designed to streamline the software development process by automating repetitive tasks and ensuring that changes to the codebase are tested and deployed consistently. GitLab addressed arbitrary pipeline execution vulnerabilities multiple times in recent months, including in July 2024, to fix CVE-2024-6385, in June 2024, to fix CVE-2024-5655, and in September 2023 to patch CVE-2023-5009, all rated critical. The bulletin also lists four high-severity issues with scores between 6.7 – 8.5, that could potentially allow attackers to disrupt services, execute unauthorized commands, or compromise sensitive resources. The issues are summarized as follows: For update instructions, source code, and packages, check out GitLab’s official download portal. The latest GitLab Runner packages are available here.
Daily Brief Summary
GitLab issued updates for versions 17.3.2, 17.2.5, and 17.1.7 to fix 18 security vulnerabilities, prominently including CVE-2024-6678.
CVE-2024-6678, a critical vulnerability with a severity score of 9.9, allows attackers to execute pipelines as arbitrary users.
The vulnerability does not require user interaction and can be exploited with minimal privileges, posing a significant threat for remote exploitation.
Impacted versions span from GitLab CE/EE 8.14 to version 17.1.7, and all versions before 17.2.5 and 17.3.2.
GitLab pipelines are crucial for automated workflows within the Continuous Integration/Continuous Delivery (CI/CD) system of software development.
This latest patch follows several other recent critical security updates by GitLab, including patches for CVE-2024-6385, CVE-2024-5655, and CVE-2023-5009.
The release also mentions four high-severity issues that could disrupt services, execute unauthorized commands, or compromise sensitive resources.
Users and administrators are urged to access GitLab’s official download portal for update instructions and the latest patches.