Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Gitlab Authorization Vulnerability Let Attackers Steal Variables

admin by admin
Mar 8, 2024
in News
A A
0

GitLab has announced the release of updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms. These updates address critical vulnerabilities that could allow attackers to bypass authorization mechanisms and access protected variables.

The updates, versions 16.9.2, 16.8.4, and 16.7.7, come as a response to the discovery of two major security flaws, CVE-2024-0199 and CVE-2024-1299, which posed a high risk to the integrity and confidentiality of data managed through the GitLab platform.

GitLab has strongly urged all users to upgrade their installations to these latest versions to mitigate the risks associated with these vulnerabilities.

The company has already updated GitLab.com to the patched version, ensuring that online platform users are protected from these security flaws.

Understanding the Vulnerabilities

The more critical of the two, CVE-2024-0199, was identified as an authorization bypass vulnerability affecting a wide range of GitLab versions – from 11.3 up to the versions immediately preceding the patched releases.

Document

Integrate ANY.RUN in your company for Effective Malware Analysis

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..

This flaw allowed attackers to craft a payload that could be used in an old feature branch to bypass CODEOWNERS restrictions, enabling unauthorized access to protected variables.

Classified with a high severity rating (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A: N, 7.7), this vulnerability was promptly addressed in the latest GitLab releases.

CVE-2024-1299: Privilege Escalation Concern

The second vulnerability, CVE-2024-1299, involved a privilege escalation issue that affected versions 16.8 and 16.9 before the security updates.

This flaw allowed users with the custom role of manage_group_access_tokens to rotate and view group access tokens as if they had owner permissions, posing a medium severity risk (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A: N, 6.5).

Proactive Security Measures

GitLab’s commitment to security is evident in its proactive approach to identifying and patching vulnerabilities.

The company operates a scheduled monthly security release, in addition to ad-hoc releases for critical vulnerabilities, ensuring that potential security issues are addressed promptly.

Users are encouraged to visit GitLab’s security FAQ and blog posts for more information on maintaining secure GitLab installations.

The discovery of these vulnerabilities was made possible through GitLab’s HackerOne bug bounty program. Special thanks are extended to ali_shehab and ashish_r_padelkar for reporting CVE-2024-0199 and CVE-2024-1299, respectively.

In addition to the security patches, the latest GitLab releases include updates to Kubectl and Mattermost, alongside various non-security patches to enhance the platform’s stability and performance.

The swift response by GitLab to these vulnerabilities underscores the importance of continuous vigilance and prompt action in the cybersecurity landscape.

Users of GitLab are advised to upgrade their installations to the latest versions as soon as possible to safeguard their data and maintain the integrity of their development workflows.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.