Oracle TNS Protocol Vulnerability Allows Attackers to Access System Memory
May 26, 2025Prometei Malware – Active IOCs
May 27, 2025Oracle TNS Protocol Vulnerability Allows Attackers to Access System Memory
May 26, 2025Prometei Malware – Active IOCs
May 27, 2025Severity
High
Analysis Summary
GitLab has issued one of its most extensive security updates of 2025, addressing 11 vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE) platforms. The coordinated release of versions 18.0.1, 17.11.3, and 17.10.7 mitigates several high- and medium-severity flaws that expose systems to denial-of-service (DoS) attacks, resource exhaustion, and potential data leaks. The update applies to all deployment model omnibus, source code, and helm chart installations, reflecting the platform’s wide reach and the criticality of the flaws. GitLab.com has already been patched, but the company strongly urges all self-managed installations to upgrade immediately.
The most severe vulnerability, CVE-2025-0993, with a CVSS score of high, enables authenticated attackers to exhaust server resources via an unprotected large blob endpoint. Git blobs are binary objects that store the contents of files in a Git repository. Attackers can abuse GitLab’s handling of blobs larger than 10 MB, which are rate-limited to only 5 requests per minute, by repeatedly submitting oversized payloads to induce prolonged downtime. This critical flaw affects all versions before the patched releases and represents a major threat in environments lacking object storage configuration and traffic management controls.
Additional DoS vectors rated as medium-severity were also patched. CVE-2025-3111 involves unbounded Kubernetes cluster tokens, where a lack of input validation allows excessive token generation. CVE-2025-2853 relates to unvalidated note positions, which authenticated users can exploit to trigger resource strain. CVE-2024-7803 stems from a Discord webhook integration vulnerability that has historically been exploitable for DoS attacks due to the absence of rate limits. These flaws highlight a recurring theme in GitLab’s vulnerabilities: inadequate input validation and rate limiting, especially in components interacting with external services and APIs.
To mitigate these threats, GitLab recommends immediate upgrades to the latest patched versions and urges administrators to implement robust input validation and rate-limiting mechanisms. Monitoring system resources through tools like htop and dmesg can aid in the early detection of resource abuse. Furthermore, configuring object storage with appropriate size and rate constraints is essential for large-scale GitLab instances to resist blob-based DoS attacks. This update serves as a reminder of the persistent security challenges in managing complex DevOps ecosystems and the importance of proactive hardening against attack vectors that exploit system resources.
Impact
- Sensitive Data Theft
- DoS Condition
Indicators of Compromise
CVE
CVE-2025-0993
CVE-2025-3111
CVE-2025-2853
CVE-2024-7803
Remediation
- Upgrade to the latest version of GitLab, available from the GitLab Website.
- Update all self-managed GitLab installations to the latest patched versions: 18.0.1, 17.11.3, or 17.10.7.
- GitLab.com is already running the patched version.
- Ensure proper input validation for: Kubernetes cluster tokens (CVE-2025-3111), Notes positions (CVE-2025-2853), and Blob uploads and other user-supplied data
- Enforce stricter rate limits for endpoints handling large blobs and webhooks.
- Review and update webhook configurations to prevent abuse (e.g., Discord webhook – CVE-2024-7803).
- Use tools like htop to track CPU/memory usage.
- Use dmesg -T -w for real-time kernel logs to detect unusual activity or memory exhaustion.
- For large-scale GitLab deployments, set up object storage with: Defined size limits, Access control policies, and Monitoring and alerting on abnormal usage.
- Check for unsecured or excessive webhook calls.
- Add authentication and validation for all external integrations.
- Regularly audit logs to detect potential abuse by authenticated users.
- Investigate spikes in token generation, blob uploads, or API calls.
- Set quotas on user-level or project-level actions that can consume backend resources.