Rewterz
Multiple WordPress Plugins Vulnerabilities
January 23, 2025
Rewterz
Gh0st RAT – Active IOCs
January 23, 2025

Multiple GitLab Products Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2024-11931 CVSS:6.4

GitLab Community Edition (CE) and Enterprise Edition (EE) could allow a remote authenticated attacker to exfiltrate protected CI/CD variables via CI lint, caused by improper authorization validation.

CVE-2025-0314 CVSS:8.7

GitLab Community Edition (CE) and Enterprise Edition (EE) are vulnerable to cross-site scripting, caused by improper validation of user-supplied input.

CVE-2024-6324 CVSS:4.3

GitLab Community Edition (CE) and Enterprise Edition (EE) are vulnerable to a denial of service, caused by inefficient algorithmic complexity.

CVE-2024-12570 CVSS:6.7

An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.4.6, from 17.5 prior to 17.5.4, and from 17.6 prior to 17.6.2. It may have been possible for an attacker with a victim's `CI_JOB_TOKEN` to obtain a GitLab session token belonging to the victim.

CVE-2024-8650 CVSS:5.3

GitLab could allow a remote attacker to obtain sensitive information. By sending a specially crafted request, an attacker could exploit this vulnerability to view unresolved threads marked as internal notes in public projects merge requests.

CVE-2024-8116 CVSS:5.3

GitLab could allow a remote attacker to obtain sensitive information. By sending a specially crafted request, an attacker could exploit this vulnerability to retrieve branch names.

CVE-2024-8179 CVSS:5.4

GitLab is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2024-9387 CVSS:6.4

GitLab could allow a remote authenticated attacker to conduct phishing attacks, caused by an open redirect vulnerability in releases API. An attacker could exploit this vulnerability using a specially crafted URL to redirect a victim to arbitrary Web sites.

CVE-2024-8647 CVSS:5.4

GitLab could allow a remote attacker to traverse directories on the system. An attacker could use a specially crafted Harbor artifact links to view arbitrary files on the system.

CVE-2024-9367 CVSS:4.3

GitLab is vulnerable to a denial of service, caused by uncontrolled resource consumption. By parsing a maliciously crafted file, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.

CVE-2024-12292 CVSS:4

GitLab could allow a local attacker to obtain sensitive information, caused by storing sensitive information into GraphQL logs. By accessing the log files, an attacker could exploit this vulnerability to obtain sensitive information.

Impact

  • Cross-Site Scripting
  • Denial of Service
  • Privilege Escalation
  • Information Disclosure

Indicators of Compromise

CVE

  • CVE-2024-11931

  • CVE-2025-0314

  • CVE-2024-6324

  • CVE-2024-12570

  • CVE-2024-8650

  • CVE-2024-8116

  • CVE-2024-8179

  • CVE-2024-9387

  • CVE-2024-8647

  • CVE-2024-9367

  • CVE-2024-12292

Affected Vendors

  • GitLab

Affected Products

  • GitLab - 17.5.1
  • GitLab Community Edition (CE) - 17.2
  • GitLab Community Edition (CE) - 17.6.3
  • GitLab Community Edition (CE) - 17.7.2
  • GitLab Community Edition (CE) - 17.8.0
  • GitLab Enterprise Edition (EE) - 17.2
  • GitLab Enterprise Edition (EE) - 17.6.3
  • GitLab Enterprise Edition (EE) - 17.7.2
  • GitLab - 13.7
  • GitLab - 17.5
  • GitLab - 17.6

Remediation

Upgrade to the latest version of GitLab, available from the GitLab Website.

CVE-2024-11931

CVE-2025-0314

CVE-2024-6324

CVE-2024-12570

CVE-2024-8650

CVE-2024-8116

CVE-2024-8179

CVE-2024-9387

CVE-2024-8647

CVE-2024-9367

CVE-2024-12292