

Multiple WordPress Plugins Vulnerabilities
January 23, 2025
Gh0st RAT – Active IOCs
January 23, 2025
Multiple WordPress Plugins Vulnerabilities
January 23, 2025
Gh0st RAT – Active IOCs
January 23, 2025Severity
Medium
Analysis Summary
CVE-2024-11931 CVSS:6.4
GitLab Community Edition (CE) and Enterprise Edition (EE) could allow a remote authenticated attacker to exfiltrate protected CI/CD variables via CI lint, caused by improper authorization validation.
CVE-2025-0314 CVSS:8.7
GitLab Community Edition (CE) and Enterprise Edition (EE) are vulnerable to cross-site scripting, caused by improper validation of user-supplied input.
CVE-2024-6324 CVSS:4.3
GitLab Community Edition (CE) and Enterprise Edition (EE) are vulnerable to a denial of service, caused by inefficient algorithmic complexity.
CVE-2024-12570 CVSS:6.7
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.4.6, from 17.5 prior to 17.5.4, and from 17.6 prior to 17.6.2. It may have been possible for an attacker with a victim's `CI_JOB_TOKEN` to obtain a GitLab session token belonging to the victim.
CVE-2024-8650 CVSS:5.3
GitLab could allow a remote attacker to obtain sensitive information. By sending a specially crafted request, an attacker could exploit this vulnerability to view unresolved threads marked as internal notes in public projects merge requests.
CVE-2024-8116 CVSS:5.3
GitLab could allow a remote attacker to obtain sensitive information. By sending a specially crafted request, an attacker could exploit this vulnerability to retrieve branch names.
CVE-2024-8179 CVSS:5.4
GitLab is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVE-2024-9387 CVSS:6.4
GitLab could allow a remote authenticated attacker to conduct phishing attacks, caused by an open redirect vulnerability in releases API. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Web sites.
CVE-2024-8647 CVSS:5.4
GitLab could allow a remote attacker to traverse directories on the system. An attacker could use a specially crafted Harbor artifact links to view arbitrary files on the system.
CVE-2024-9367 CVSS:4.3
GitLab is vulnerable to a denial of service, caused by uncontrolled resource consumption. By parsing a maliciously crafted file, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-12292 CVSS:4
GitLab could allow a local attacker to obtain sensitive information, caused by storing sensitive information into GraphQL logs. By accessing the log files, an attacker could exploit this vulnerability to obtain sensitive information.
Impact
- Cross-Site Scripting
- Denial of Service
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
CVE-2024-11931
CVE-2025-0314
CVE-2024-6324
CVE-2024-12570
CVE-2024-8650
CVE-2024-8116
CVE-2024-8179
CVE-2024-9387
CVE-2024-8647
CVE-2024-9367
CVE-2024-12292
Affected Vendors
- GitLab
Affected Products
- GitLab - 17.5.1
- GitLab Community Edition (CE) - 17.2
- GitLab Community Edition (CE) - 17.6.3
- GitLab Community Edition (CE) - 17.7.2
- GitLab Community Edition (CE) - 17.8.0
- GitLab Enterprise Edition (EE) - 17.2
- GitLab Enterprise Edition (EE) - 17.6.3
- GitLab Enterprise Edition (EE) - 17.7.2
- GitLab - 13.7
- GitLab - 17.5
- GitLab - 17.6
Remediation
Upgrade to the latest version of GitLab, available from the GitLab Website.