Rewterz
Rewterz Threat Alert – FormBook Malware – Active IOCs
May 3, 2023
Rewterz
Rewterz Threat Alert – Earth Preta aka Mustang Panda APT Group – Active IOCs
May 3, 2023

Rewterz Threat Advisory –Multiple GitLab Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2022-4376 CVSS:3.1

GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to map a private email of a GitLab user to their GitLab account on an instance.

CVE-2023-1836 CVSS:4.4

GitLab is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability using a specially crafted XML file in a repository in “raw” mode to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed.

CVE-2023-0756 CVSS:4.8

GitLab could allow a remote authenticated attacker to execute arbitrary code on the system. By using specially crafted name for main branch of a repository, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2023-0805 CVSS:4.9

GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the group member management. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass access restrictions.

CVE-2023-1178 CVSS:5.7

GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by the failure to guarantee file integrity when downloading source code or installation packages from a tag or from a release in web interface. By sending a specially crafted request, an attacker could exploit this vulnerability to compromise file integrity.

CVE-2023-1621 CVSS:6.5

GitLab could allow a remote authenticated attacker to bypass security restrictions. By sending a specially crafted request, an attacker could exploit this vulnerability to commit to projects even from a restricted IP address.

CVE-2023-1965 CVSS:6.8

GitLab could allow a remote attacker to obtain sensitive information, caused by the lack of verification on RelayState parameter. By using a specially crafted URL, an attacker could exploit this vulnerability to obtain access tokens granted for 3rd party Group SAML SSO logins.

CVE-2023-2182 CVSS:6.8

GitLab could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw when OpenID Connect is enabled on an instance. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.

Impact

  • Code Execution
  • Privilege Escalation
  • Cross-Site Scripting
  • Security Bypass
  • Information Disclosure

Indicators Of Compromise

CVE

  • CVE-2022-4376
  • CVE-2023-1836
  • CVE-2023-0756
  • CVE-2023-0805
  • CVE-2023-1178
  • CVE-2023-1621
  • CVE-2023-1965
  • CVE-2023-2182

Affected Vendors

GitLab

Affected Products

  • GitLab Community Edition 15.11.0
  • GitLab Community Edition 15.10.4
  • GitLab Enterprise Edition 15.11.0
  • GitLab Enterprise Edition 15.10.4
  • GitLab Community Edition 15.9.5
  • GitLab Enterprise Edition 15.9.5

Remediation

GitLab Web site