Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Urgent: GitLab releases patch for critical vulnerability
    Cyber Security

    Urgent: GitLab releases patch for critical vulnerability

    techempireBy techempireNo Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 12, 2024Editorial DepartmentDevSecOps/Software Security

    Yate Labs Vulnerability

    GitLab has released security updates to address two critical vulnerabilities, one of which can be exploited to take over an account without any user interaction.

    Tracked as CVE-2023-7028the vulnerability has a maximum severity of 10.0 on the CVSS scoring system and could facilitate account compromise by sending password reset emails to unverified email addresses.

    The DevSecOps platform said the vulnerability was caused by an error in the email verification process that allowed users to reset their passwords via a secondary email address.

    Internet security

    It affects all self-managed instances of GitLab Community Edition (CE) and Enterprise Edition (EE) using the following versions –

    • 16.1 before 16.1.6
    • 16.2 before 16.2.9
    • 16.3 before 16.3.7
    • 16.4 before 16.4.5
    • 16.5 before 16.5.6
    • 16.6 16.6.4 before
    • 16.7.2 Previous 16.7

    GitLab said it has resolved the issue in GitLab versions 16.5.6, 16.6.4 and 16.7.2, in addition to backporting the fix to versions 16.1.6, 16.2.9, 16.3.7 and 16.4.5. question. The company further noted that the vulnerability was introduced in 16.1.0 on May 1, 2023.

    Internet security

    “In these releases, all authentication mechanisms are affected,” GitLab said. “Additionally, users who have two-factor authentication enabled are vulnerable to password resets but not account takeovers because they require a second authentication factor to log in.”

    As part of the latest update, GitLab also fixed another critical flaw (CVE-2023-5356, CVSS score: 9.6) that allowed users to abuse the Slack/Mattermost integration to execute slash commands as other users.

    To mitigate any potential threats, it is recommended to upgrade your instance to a patched version as soon as possible and enable 2FA if it is not already enabled, especially for consumers with elevated privileges.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.