Article Details

Original Article Text

Click to Toggle View

Critical GitLab bug lets attackers run pipelines as any user. A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user. GitLab is a popular web-based open-source software project management and work tracking platform. It has an estimated one million active license users. The security issue addressed in the lasted update is tracked as CVE-2024-5655 and has a severity score of 9.6 out of 10. Under certain circumstances, which the vendor did not define, an attacker could leverage it to trigger a pipeline as another user. GitLab pipelines are a feature of the Continuous Integration/Continuous Deployment (CI/CD) system that enables users to automatically run processes and tasks, either in parallel or in sequence, to build, test, or deploy code changes. The vulnerability impacts all GitLab CE/EE versions from 15.8 through 16.11.4, 17.0.0 to 17.0.2, and 17.1.0 to 17.1.0. GitLab has addressed the vulnerability by releasing versions 17.1.1, 17.0.3, and 16.11.5, and recommends users to apply the updates as soon as possible. The vendor also informs that upgrading to the latest versions comes with two breaking changes that users should be aware of: The latest GitLab update also introduces security fixes for 13 other issues, the severity of three of them being rated as “high” (CVSS v3.1 score: 7.5 – 8.7). These three are summarized as follows: Resources for GitLab updates are available here, while GitLab Runner guidelines can be found on this page.

Daily Brief Summary

CYBERCRIME // Critical GitLab Vulnerability Allows Unauthorized Pipeline Access

A severe vulnerability, identified as CVE-2024-5655 with a 9.6 CVSS score, has been found in GitLab Community and Enterprise Editions.

Attackers could exploit this flaw to execute pipelines as any GitLab user, compromising both software integrity and data security.

Affected versions include GitLab CE/EE from 15.8 through 17.1.0, with patches available in versions 17.1.1, 17.0.3, and 16.11.5.

Users are urged to update immediately to mitigate risks, though they should be cautious of two breaking changes introduced with the patches.

The update also rectifies additional 13 security issues, with three classified as high severity, enhancing overall platform security.

GitLab is widely utilized with over one million active users, emphasizing the high impact of this security loophole.

Comprehensive update resources and guidelines for GitLab Runner are publically available to aid users in securing their environments.