GitLab has once again released a fix to address a critical security vulnerability in its Community Edition (CE) and Enterprise Edition (EE) that could be exploited to write arbitrary files when creating a workspace.
Tracked as CVE-2024-0402the vulnerability has a CVSS score of 9.9 (out of 10).
“An issue has been discovered in GitLab CE/EE, affecting all versions of 16.0 before 16.5.8, 16.6 before 16.6.6, 16.7 before 16.7.4, and 16.8 before 16.8.1, that allows authenticated When users write to create a workspace, the file will be copied to any location on the GitLab server,” GitLab said in an announcement on January 25, 2024.
The company also noted that patches for the bug have been backported to 16.5.8, 16.6.6, 16.7.4, and 16.8.1.
GitLab also addressed four medium-severity flaws that could lead to regular expression denial of service (ReDoS), HTML injection, and the disclosure of a user’s public email address via tagged RSS feeds.
The latest update comes two weeks after the DevSecOps platform released fixes to address two critical flaws, one of which could be exploited to take over an account without any user interaction (CVE-2023-7028, CVSS score: 10.0).
Users are advised to upgrade their installations to a patched version as soon as possible to reduce potential risks. GitLab.com and GitLab Dedicated environments are already running the latest version.
1 Comment
Pingback: Urgent: Upgrading GitLab – Critical workspace build flaw allows archive overwriting – Tech Empire Solutions