New GitLab Vulnerability Poses Risk of Unauthorized CI/CD Pipeline Execution

GitLab Issues Significant Security Updates Addressing Vulnerabilities

GitLab has issued critical security updates for its Community Edition (CE) and Enterprise Edition (EE), specifically targeting eight identified vulnerabilities. Notably, one severe flaw allows unauthorized execution of Continuous Integration and Continuous Delivery (CI/CD) pipelines across arbitrary branches. This vulnerability, cataloged as CVE-2024-9164, has a high CVSS rating of 9.6 out of 10, indicating its critical nature.

The affected versions include GitLab EE from 12.5 up to but not including 17.2.9, as well as 17.3 up to 17.3.5 and 17.4 up to 17.4.2. GitLab, in an advisory communication, highlighted the potential risks associated with this vulnerability, emphasizing the importance of timely updates to secure systems against unauthorized pipeline operations.

In addition to the critical flaw, the updates also address seven other vulnerabilities with varying severity ratings. Among these, four are categorized as high risk, two as medium, and one as low. One high-severity issue, identified as CVE-2024-8970, enables an attacker to trigger a pipeline under another user’s identity under specific circumstances. Additionally, CVE-2024-8977 allows for Server-Side Request Forgery (SSRF) attacks impacting GitLab EE instances that have the Product Analytics Dashboard enabled. Another critical issue, CVE-2024-9631, results in significant slowdowns when attempting to view diffs of merge requests with conflicts, while CVE-2024-6530 exposes users to HTML injection through a cross-site scripting issue during OAuth authorizations.

This advisory adds to a series of pipeline-related vulnerabilities recently disclosed by GitLab, marking a troubling trend for users who depend on the platform for secure software development practices. In a previous update, the company addressed CVE-2024-6678, a flaw with a CVSS score of 9.9, which jeopardized the integrity of pipeline jobs by allowing execution under arbitrary user accounts.

Despite no confirmed incidents of active exploitation of these vulnerabilities, GitLab advises that users upgrade to the latest versions to mitigate potential risks. The growing number of vulnerabilities, particularly those related to CI/CD functionality, highlights the necessity for organizations to remain vigilant and proactive in their cybersecurity measures.

Business owners must take note of the potential MITRE ATT&CK tactics that could exploit these vulnerabilities. Initial access techniques may allow adversaries to gain a foothold through misconfigured permissions or uncovered flaws. Techniques such as privilege escalation could further enable attackers to acquire higher-level access and execute unauthorized commands, exacerbating the potential impact of these vulnerabilities on organizational systems.

With the ongoing escalation of cyber threats, it is imperative for organizations utilizing GitLab to ensure their environments are secured against such risks, thereby reinforcing their defenses against potential adversarial attacks.

As businesses navigate an increasingly perilous cybersecurity landscape, staying informed about critical updates and potential vulnerabilities is essential for safeguarding sensitive operations and data.

Source link