GitLab Releases Critical Updates to Address XSS Vulnerability
Date: July 25, 2024
CVE: CVE-2024-5067
Vulnerability Type: Cross-Site Scripting (XSS)
CWE: [[CWE-79]], [[CWE-352]], [[CWE-264]]
Sources: GitLab Critical Patch Release, Security Online Info, CERT-EU
Synopsis
GitLab has released critical updates for its Community Edition (CE) and Enterprise Edition (EE) to address multiple vulnerabilities, including a high-severity cross-site scripting (XSS) flaw.
Issue Summary
On May 24, GitLab released new versions of GitLab Community Edition (CE) and Enterprise Edition (EE) with crucial bug and security fixes. These updates address a significant vulnerability, CVE-2024-4835, with a CVSS score of 8.0, which allows attackers to take over accounts via an XSS flaw. Exploiting this through the VS code editor (Web IDE), an attacker can create a malicious page to steal sensitive user information. User interaction is required, This does increase the attack complexity. All versions of GitLab CE and EE up to 16.10.6, versions 16.11 up to 16.11.3, and versions 17.0 up to 17.0.1 are affected. Patches are released by GitLab: 17.2.1, 17.1.3, 17.0.5
Technical Key Findings
The XSS vulnerability (CVE-2024-5067) is exploited through the Maven Dependency Proxy, where attackers can inject malicious scripts that run in the user's session. This flaw has a CVSS score of 7.7, indicating high severity.
Vulnerable Products
- GitLab CE/EE versions from 16.6 up to 17.2.1
- Specific vulnerabilities affect versions 17.1 prior to 17.1.3 and 17.2 prior to 17.2.1
Impact Assessment
Exploitation of this vulnerability can lead to arbitrary code execution, potentially compromising user accounts and leaking sensitive information.
Patches or Workarounds
GitLab has released patches in versions 17.2.1, 17.1.3, and 17.0.5. It is strongly recommended that all installations be upgraded to these versions immediately to mitigate the risk.
Tags
#GitLab #CVE-2024-5067 #XSS #SecurityUpdate #Vulnerability #Patch #Cybersecurity