Thursday , April 24 2025
Gitlab

GitLab issues Critical Patches to Address Multiple Vulnerabilities

GitLab, a platform for DevOps tools, released critical updates for its Community Edition (CE) and Enterprise Edition (EE). The new versions, 17.1.1, 17.0.3, and 16.11.5, include security and bug fixes. Users should upgrade now to protect their installations from possible exploits.

Key Security Fixes:

SonicWall patched SSLVPN Vuln Allowing Firewall Crashing

SonicWall has revealed a vulnerability in its SonicOS SSLVPN Virtual Office interface that could let remote attackers crash firewall appliances....
Read More
SonicWall patched SSLVPN Vuln Allowing Firewall Crashing

GitLab Releases Security Update For Multiple Vulns

GitLab has announced a security advisory urging users to upgrade their self-managed installations right away. Versions 17.11.1, 17.10.5, and 17.9.7...
Read More
GitLab Releases Security Update For Multiple Vulns

ISPAB president “whatsapp” got hacked via phishing link

Imdadul Haque, the president of Internet Service Provider of Bangladesh (ISPAB) said, I automatically got back my WhatsApp account. What...
Read More
ISPAB president “whatsapp” got hacked via phishing link

Zyxel released patches 2 vulns in its USG FLEX H series firewalls

Zyxel Networks has issued critical security patches for two high-severity vulnerabilities in its USG FLEX H series firewalls. These flaws...
Read More
Zyxel released patches 2 vulns in its USG FLEX H series firewalls

South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related...
Read More
South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

ChatGPT Develops Exploit for CVEs Before Public PoCs Share

Security researcher Matt Keeley showed that artificial intelligence can now develop working exploits for critical vulnerabilities before public proof-of-concept (PoC)...
Read More
ChatGPT Develops Exploit for CVEs Before Public PoCs Share

TP-Link Router Vulns Allow to Execute Malicious SQL Commands

Several vulnerabilities have been found in TP-Link routers, exposing users to serious security risks from SQL injection flaws in their...
Read More
TP-Link Router Vulns Allow to Execute Malicious SQL Commands

SSL.com’s domain validation system’s bug found: Hacker exploited

SSL.com has revealed a major security flaw in its domain validation system, which could enable attackers to acquire fake SSL...
Read More
SSL.com’s domain validation system’s bug found: Hacker exploited

Amazon Follows Microsoft’s Lead, Halts Some Data Center Deals

Amazon has paused some data center lease negotiations for its cloud division, particularly in international markets, according to Wells Fargo...
Read More
Amazon Follows Microsoft’s Lead, Halts Some Data Center Deals

Hackers Exploit Zoom’s Remote Control Feature for System Access

ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom's remote control feature to access victims'...
Read More
Hackers Exploit Zoom’s Remote Control Feature for System Access

CVE-2024-5655 (CVSS 9.6) – Run Pipelines as Any User:

A serious vulnerability (CVE-2024-5655) affects GitLab versions from 15.8 and later. This vulnerability allows attackers to initiate pipelines as a different user in specific situations, creating a major security threat. To fix this, the patch changes how Merge Request (MR) re-targeting works. Users will need to manually start pipelines when merging a target branch. Moreover, the default setting now disables GraphQL authentication with CI_JOB_TOKEN, so other authentication methods must be used.

CVE-2024-4901 (CVSS 8.7) – Stored XSS in Imported Project’s Commit Notes:

Issue CVE-2024-4901 is a stored Cross-Site Scripting (XSS) vulnerability. It can be exploited through malicious commit notes in imported projects, affecting versions from 16.9 onwards. If successful, attackers could execute arbitrary scripts in the user’s session.

CVE-2024-4994 (CVSS 8.1) – CSRF on GraphQL API IntrospectionQuery:

The Cross-Site Request Forgery (CSRF) vulnerability (CVE-2024-4994) affects all versions from 16.1.0 onwards. This issue allows attackers to execute arbitrary GraphQL mutations, potentially leading to unauthorized actions within the GitLab instance.

Additional Vulnerabilities Addressed:

GitLab’s latest releases also address several other significant vulnerabilities:

CVE-2024-6323 (CVSS 7.5): Unauthorized access to private repository content in public projects.

CVE-2024-2177 (CVSS 6.8): Cross-window forgery in user application OAuth flow.

CVE-2024-5430 (CVSS 6.8): Ignoring group merge request approval policies.

CVE-2024-4025 (CVSS 6.5): ReDoS vulnerability in custom markdown pages.

CVE-2024-3959 (CVSS 6.5): Unauthorized access to private job artifacts.

CVE-2024-4557 (CVSS 6.5): Security fixes for Banzai pipeline.

CVE-2024-1493 (CVSS 6.5): ReDoS in dependency linker.

CVE-2024-1816 (CVSS 5.3): Denial of Service (DoS) using crafted OpenAPI files.

CVE-2024-2191 (CVSS 5.3): Disclosure of Merge Request titles.

CVE-2024-3115 (CVSS 4.3): Access issues to epics without an SSO session.

CVE-2024-4011 (CVSS 3.1): Non-project members promoting key results to objectives.

Urgent Upgrade Recommendation

GitLab has not found any evidence of these vulnerabilities being used by attackers, but it is important to take immediate action because these flaws are very serious. Users of GitLab CE and EE should upgrade to versions 17.1.1, 17.0.3, or 16.11.5 right away to make sure their installations are secure and stable.

Check Also

SQL

TP-Link Router Vulns Allow to Execute Malicious SQL Commands

Several vulnerabilities have been found in TP-Link routers, exposing users to serious security risks from …

Leave a Reply

Your email address will not be published. Required fields are marked *