GitLab Issues Fix for Critical CI/CD Pipeline Security Issue and 13 Other Vulnerabilities

June 28, 2024NewsroomSoftware Security / DevOps

GitLab has rolled out security patches to fix 14 security vulnerabilities, including a critical flaw that could allow unauthorized execution of continuous integration and continuous deployment (CI/C

GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others

June 28, 2024NewsroomSoftware Security / DevOps

GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others

GitLab has rolled out security patches to fix 14 security vulnerabilities, including a critical flaw that could allow unauthorized execution of continuous integration and continuous deployment (CI/CD) pipelines.

These vulnerabilities affect GitLab Community Edition (CE) and Enterprise Edition (EE), and have been rectified in versions 17.1.1, 17.0.3, and 16.11.5.

The most significant vulnerability is CVE-2024-5655 (CVSS score: 9.6), which could enable a malicious actor to initiate a pipeline as a different user under specific conditions.

It impacts the following versions of CE and EE:

  • Versions 17.1 before 17.1.1
  • Versions 17.0 before 17.0.3
  • Versions 15.8 before 16.11.5

According to GitLab, the fix brings about two major changes, resulting in the deactivation of GraphQL authentication using CI_JOB_TOKEN by default and halting automatic pipeline execution when a merge request is retargeted after merging its previous target branch.

Cybersecurity

Here are some of the other critical flaws addressed in the latest update:

  • CVE-2024-4901 (CVSS score: 8.7) – Addressed a stored XSS vulnerability that could be introduced from a project with malicious commit notes
  • CVE-2024-4994 (CVSS score: 8.1) – Fixed a CSRF attack on GitLab’s GraphQL API that could lead to the execution of unauthorized GraphQL mutations
  • CVE-2024-6323 (CVSS score: 7.5) – Resolved an authorization flaw in the global search feature, preventing sensitive information leakage from private repositories within public projects
  • CVE-2024-2177 (CVSS score: 6.8) – Mitigated a cross-window forgery vulnerability that allows a threat actor to manipulate the OAuth authentication flow using a forged payload

While there is no reported exploitation of these vulnerabilities, it is recommended for users to apply the patches as a preventive measure against potential security risks.

Enjoyed this article? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.