Article Details
Scrape Timestamp (UTC): 2024-01-12 13:06:38.124
Source: https://thehackernews.com/2024/01/urgent-gitlab-releases-patch-for.html
Original Article Text
Click to Toggle View
Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP. GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take over accounts without requiring any user interaction. Tracked as CVE-2023-7028, the flaw has been awarded the maximum severity of 10.0 on the CVSS scoring system and could facilitate account takeover by sending password reset emails to an unverified email address. The DevSecOps platform said the vulnerability is the result of a bug in the email verification process, which allowed users to reset their password through a secondary email address. It affects all self-managed instances of GitLab Community Edition (CE) and Enterprise Edition (EE) - GitLab said it addressed the issue in GitLab versions 16.5.6, 16.6.4, and 16.7.2, in addition to backporting the fix to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5. The company further noted the bug was introduced in 16.1.0 on May 1, 2023. "Within these versions, all authentication mechanisms are impacted," GitLab said. "Additionally, users who have two-factor authentication enabled are vulnerable to password reset but not account takeover as their second authentication factor is required to login." Also patched by GitLab as part of the latest update is another critical flaw (CVE-2023-5356, CVSS score: 9.6), which permits a user to abuse Slack/Mattermost integrations to execute slash commands as another user. To mitigate any potential threats, it's advised to upgrade the instances to a patched version as soon as possible and enable 2FA, if not already, particularly for users with elevated privileges. The Ultimate Enterprise Browser Checklist Download a Concrete and Actionable Checklist for Finding a Browser Security Platform. Master Cloud Security - Get FREE eBook Comprehensive eBook covering cloud security across infrastructure, containers, and runtime environments for security professionals
Daily Brief Summary
GitLab has issued security updates for two critical vulnerabilities with potential for severe exploitation, including unauthorized account access.
The most severe vulnerability, tracked as CVE-2023-7028, scored 10.0 on the CVSS scale, could allow attackers to reset passwords through unverified email addresses and facilitate account takeovers.
The flaw affects all self-managed versions of GitLab Community Edition (CE) and Enterprise Edition (EE) since it was introduced on May 1, 2023, in version 16.1.0.
Updated versions 16.5.6, 16.6.4, and 16.7.2 have been released, with backported fixes available for versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5.
Even users with two-factor authentication (2FA) enabled are vulnerable to password reset attacks, though 2FA can prevent full account takeover.
Another critical flaw, CVE-2023-5356 (CVSS score: 9.6), was corrected, which previously allowed users to execute commands as another user through Slack/Mattermost integrations.
It's paramount for organizations using GitLab to upgrade to the patched versions immediately and enforce 2FA, especially for users with administrative access to mitigate risks.