GitLab Faces Critical CI/CD Vulnerability Impacting Multiple Versions

Unauthorized CI/CD Pipeline Execution

A severe security vulnerability has been identified and patched in GitLab’s platform. The most critical issue (tracked as CVE-2024-9164) enables attackers to circumvent branch protection mechanisms, potentially allowing them to initiate CI/CD pipelines on any branch within a repository without proper authorization. This security flaw has been assigned a CVSS v3.1 severity rating of 9.6 out of 10, highlighting its significant impact. Exploiting this vulnerability could lead to unauthorized code execution or exposure of confidential data. GitLab has released security updates to remediate this and other identified vulnerabilities.

Impacted Versions and Urgent Upgrade Recommendations

This security issue impacts multiple versions of GitLab Enterprise Edition (EE), spanning several major releases. Specifically, the vulnerability is present in:

  • All versions from 12.5 through 17.2.8
  • Versions 17.3 through 17.3.4
  • Versions 17.4 through 17.4.1

To mitigate the security risk, GitLab strongly recommends that users promptly update their installations to one of the following patched versions:

  • Version 17.4.2
  • Version 17.3.5
  • Version 17.2.9

Immediate action is advised to prevent potential security breaches. However, customers using GitLab Dedicated, require no actions as their instances are automatically maintained with the latest security updates.

Security Fixes

TitleSeverity
Run pipelines on arbitrary branchesCritical
An attacker can impersonate arbitrary userHigh
SSRF in Analytics DashboardHigh
Viewing diffs of MR with conflicts can be slowHigh
HTMLi in OAuth pageHigh
Deploy Keys can push changes to an archived repositoryMedium
Guests can disclose project templatesMedium
GitLab instance version disclosed to unauthorized usersLow

Conclusion

This pipeline vulnerability is not an isolated incident for GitLab, as the platform has addressed several similar critical security issues throughout the year. Notable recent fixes include:

For comprehensive update guidance, GitLab directs users to their official download portal. There, users can find:

  • Detailed installation instructions
  • Access to source code
  • Various software packages
  • Updated GitLab Runner components

This recurring pattern of pipeline-related vulnerabilities emphasizes the importance of staying current with GitLab’s security updates.

References

Leave a Comment

Вашият имейл адрес няма да бъде публикуван. Задължителните полета са отбелязани с *

bg_BGBG