Rewterz
Growing Clipper Malware Attacks Target Cryptocurrency Users
September 18, 2024
Rewterz
GuLoader Malspam Campaign – Active IOCs
September 18, 2024

Multiple GitLab Products Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2024-8754 CVSS:6.4

GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by an improper input validation error. An attacker could exploit this vulnerability to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.

CVE-2024-6685 CVSS:3.1

GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by incorrect authorization. An attacker could exploit this vulnerability to view group runners information.

CVE-2024-4472 CVSS:4

GitLab could allow a local authenticated attacker to obtain sensitive information, caused by insertion of sensitive information into log file. An attacker could exploit this vulnerability to obtain sensitive information.

CVE-2024-2743 CVSS:5.3

GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by incorrect authorization. An attacker could exploit this vulnerability to modify an on-demand DAST scan without permissions and leak variables.

CVE-2024-4283 CVSS:6.4

GitLab could allow a remote authenticated attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Websites.

CVE-2024-4660 CVSS:6.5

GitLab could allow a remote authenticated attacker to obtain sensitive information, caused by missing authorization. By using group templates, a remote attacker could exploit this vulnerability to read the source code of a private.

CVE-2024-8631 CVSS:5.5

GitLab could allow a remote authenticated attacker to gain elevated privileges on the system, caused by privilege defined with unsafe action, By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.

CVE-2024-6389 CVSS:4.3

GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to commit information via the release Atom endpoint, contrary to permissions.

CVE-2024-6446 CVSS:3.5

GitLab could provide weaker than expected security, caused by business logic errors. By using a crafted UR, a remote authenticated attacker could exploit this vulnerability to trick a victim to trust an attacker controlled application.

CVE-2024-8311 CVSS:6.5

GitLab could allow a remote authenticated attacker to bypass security restrictions, caused by improper protection of alternate path. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass variable overwrite protection.

CVE-2024-5435 CVSS:4.5

GitLab could allow a remote authenticated attacker to obtain sensitive information. An attacker could exploit this vulnerability to obtain sensitive information from repository mirror configuration.

Impact

  • Security Bypass
  • Information Disclosure
  • Privilege Escalation

Indicators of Compromise

CVE

  • CVE-2024-8754
  • CVE-2024-6685
  • CVE-2024-4472
  • CVE-2024-2743
  • CVE-2024-4283
  • CVE-2024-4660
  • CVE-2024-8631
  • CVE-2024-6389
  • CVE-2024-6446
  • CVE-2024-8311
  • CVE-2024-5435

Affected Vendors

GitLab

Affected Products

  • GitLab - 17.1.6
  • GitLab - 17.2.4
  • GitLab - 17.3.1
  • GitLab Enterprise Edition - 17.1.6
  • GitLab Enterprise Edition - 17.2.4
  • GitLab Enterprise Edition - 17.3.1
  • GitLab - 17.1.7
  • GitLab - 17.2.5
  • GitLab - 17.3.2

Remediation

Refer to GitLab Website for patch, upgrade or suggested workaround information.

CVE-2024-8754

CVE-2024-6685

CVE-2024-4472

CVE-2024-2743

CVE-2024-4283

CVE-2024-4660

CVE-2024-8631

CVE-2024-6389

CVE-2024-6446

CVE-2024-8311

CVE-2024-5435