Growing Clipper Malware Attacks Target Cryptocurrency Users
September 18, 2024GuLoader Malspam Campaign – Active IOCs
September 18, 2024Growing Clipper Malware Attacks Target Cryptocurrency Users
September 18, 2024GuLoader Malspam Campaign – Active IOCs
September 18, 2024Severity
Medium
Analysis Summary
CVE-2024-8754 CVSS:6.4
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by an improper input validation error. An attacker could exploit this vulnerability to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.
CVE-2024-6685 CVSS:3.1
GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by incorrect authorization. An attacker could exploit this vulnerability to view group runners information.
CVE-2024-4472 CVSS:4
GitLab could allow a local authenticated attacker to obtain sensitive information, caused by insertion of sensitive information into log file. An attacker could exploit this vulnerability to obtain sensitive information.
CVE-2024-2743 CVSS:5.3
GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by incorrect authorization. An attacker could exploit this vulnerability to modify an on-demand DAST scan without permissions and leak variables.
CVE-2024-4283 CVSS:6.4
GitLab could allow a remote authenticated attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Websites.
CVE-2024-4660 CVSS:6.5
GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by missing authorization. By using group templates, a remote attacker could exploit this vulnerability to read the source code of a private.
CVE-2024-8631 CVSS:5.5
GitLab could allow a remote authenticated attacker to gain elevated privileges on the system, caused by privilege defined with unsafe action, By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2024-6389 CVSS:4.3
GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to commit information via the release Atom endpoint, contrary to permissions.
CVE-2024-6446 CVSS:3.5
GitLab could provide weaker than expected security, caused by business logic errors. By using a crafted UR, a remote authenticated attacker could exploit this vulnerability to trick a victim to trust an attacker controlled application.
CVE-2024-8311 CVSS:6.5
GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper protection of alternate path. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass variable overwrite protection.
CVE-2024-5435 CVSS:4.5
GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to obtain sensitive information from repository mirror configuration.
Impact
- Security Bypass
- Information Disclosure
- Privilege Escalation
Indicators of Compromise
CVE
- CVE-2024-8754
- CVE-2024-6685
- CVE-2024-4472
- CVE-2024-2743
- CVE-2024-4283
- CVE-2024-4660
- CVE-2024-8631
- CVE-2024-6389
- CVE-2024-6446
- CVE-2024-8311
- CVE-2024-5435
Affected Vendors
Affected Products
- GitLab - 17.1.6
- GitLab - 17.2.4
- GitLab - 17.3.1
- GitLab Enterprise Edition - 17.1.6
- GitLab Enterprise Edition - 17.2.4
- GitLab Enterprise Edition - 17.3.1
- GitLab - 17.1.7
- GitLab - 17.2.5
- GitLab - 17.3.2
Remediation
Refer to GitLab Website for patch, upgrade or suggested workaround information.