### #GitLabSecurity #VulnerabilityPatch #SessionDataExfiltration
Summary: GitLab has released a critical security update addressing multiple vulnerabilities across various versions of its platform, which could lead to severe consequences such as account takeovers and denial of service attacks. Users are strongly urged to update their installations to mitigate these risks.
Threat Actor: Unknown | unknown
Victim: GitLab Users | GitLab users
Key Point :
- Critical vulnerabilities include CVE-2024-11274, allowing session data exfiltration through NEL header injection.
- CVE-2024-8233 enables denial of service attacks via unauthenticated requests for diff-files, affecting all versions from 9.4.
- Medium and low-severity vulnerabilities include potential CI_JOB_TOKEN exploitation, open redirects, path traversal, and XSS attacks.
- Unauthorized access to confidential information, such as branch names and incident details, is also a concern.
- GitLab encourages immediate updates to the latest versions to protect against these vulnerabilities.
GitLab has issued an important security update addressing a range of vulnerabilities affecting multiple versions of its platform. The update, which includes versions 17.6.2, 17.5.4, and 17.4.6 for Community Edition (CE) and Enterprise Edition (EE), tackles flaws that could lead to serious consequences, including account takeovers, denial of service attacks, and information disclosure.
One of the most severe vulnerabilities, identified as CVE-2024-11274 (CVSS 8.7), allows for the “injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to session data exfiltration.” This high-severity flaw could enable attackers to steal user session data and potentially gain unauthorized access to accounts.
Another critical issue, CVE-2024-8233 (CVSS 7.5), enables attackers to launch denial of service attacks by “repeatedly sending unauthenticated requests for diff-files.” This vulnerability affects all GitLab versions from 9.4, highlighting the urgency for users to update their installations.
The update also addresses several medium and low-severity vulnerabilities, including:
- CI_JOB_TOKEN Exploitation: Attackers could potentially use stolen CI_JOB_TOKENs to gain access to user sessions.
- Open Redirects and Path Traversal: Vulnerabilities related to open redirects and path traversal could be exploited for phishing attacks and information leakage.
- Cross-Site Scripting (XSS) and HTML Injection: Flaws related to improper output encoding and vulnerability details could lead to XSS attacks if Content Security Policy (CSP) is not enabled.
- Information Leaks: Unauthorized users could gain access to confidential information, such as branch names in private projects and incident details.
GitLab strongly urges all users to update their installations to the latest versions “as soon as possible” to mitigate these security risks. The company credits security researchers who reported these vulnerabilities through its HackerOne bug bounty program.
Related Posts:
Source: https://securityonline.info/cve-2024-11274-gitlab-vulnerability-exposes-user-accounts