About the Vulnerability

Introduction

GitLab is an open-source repository management project. It uses Git for code management and provides Git-based web services.

Summary

On July 11, 2024, Sangfor FarSight Labs received notification of the authentication bypass vulnerability (CVE-2024-6385) in GitLab, classified as critical (CVSS Score 9.6) by GitLab.

This vulnerability exists in GitLab Community Edition (CE) and Enterprise Edition (EE). Attackers can exploit this vulnerability to trigger a pipeline as another user, causing sensitive information leak and server compromise.

Affected Versions

15.8 ≤ GitLab CE/EE ≤ 16.11.5

17.0 ≤ GitLab CE/EE ≤ 17.0.3

17.1 ≤ GitLab CE/EE ≤ 17.1.1

Solutions

Remediation Solutions

Check the Component Version

View your GitLab version at https://your GitLab instance address/help, for example, https://your.gitlab.com/help.

Official Solution

GitLab has released the latest version of CE/EE to fix the vulnerability, and affected users are strongly advised to update to the latest version. Download link: https://about.gitlab.com/update

Timeline

On July 11, 2024, Sangfor FarSight Labs received notification of the GitLab authentication bypass vulnerability (CVE-2024-6385).

On July 11, 2024, Sangfor FarSight Labs released a vulnerability alert.

References

https://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

See Other Product