Friday , April 18 2025
Gitlab

GitLab issues Critical Patches to Address Multiple Vulnerabilities

GitLab, a platform for DevOps tools, released critical updates for its Community Edition (CE) and Enterprise Edition (EE). The new versions, 17.1.1, 17.0.3, and 16.11.5, include security and bug fixes. Users should upgrade now to protect their installations from possible exploits.

Key Security Fixes:

16,000+ Fortinet devices compromised with symlink backdoor, Mostly in Asia

According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new technique called "symlink". This number...
Read More
16,000+  Fortinet devices compromised with symlink backdoor, Mostly in Asia

Patch now! Critical Erlang/OTP SSH Vuln Allows UCE

A critical security flaw has been found in the Erlang/Open Telecom Platform (OTP) SSH implementation, allowing an attacker to run...
Read More
Patch now! Critical Erlang/OTP SSH Vuln Allows UCE

CISA warns of increasing risk tied to Oracle legacy Cloud leak

On Wednesday, CISA alerted about increased breach risks due to the earlier compromise of legacy Oracle Cloud servers, emphasizing the...
Read More
CISA warns of increasing risk tied to Oracle legacy Cloud leak

CVE-2025-20236
Cisco Patches Unauthenticated RCE Flaw in Webex App

Cisco issued a security advisory about a serious vulnerability in its Webex App that allows unauthenticated remote code execution (RCE)...
Read More
CVE-2025-20236  Cisco Patches Unauthenticated RCE Flaw in Webex App

Apple released emergency security updates for 2 zero-day vulns

On Wednesday, Apple released urgent operating system updates to address two security vulnerabilities that had already been exploited in highly...
Read More
Apple released emergency security updates for 2 zero-day vulns

Oracle Released Patched for 378 flaws for April 2025

On April 15, 2025, Oracle released a Critical Patch Update for 378 flaws for its products. The patch update covers...
Read More
Oracle Released Patched for 378 flaws for April 2025

CVE-2025-24054
Hackers Exploiting NTLM Spoofing Windows Vuln the in Wild

Check Point Research warns of the active exploitation of a new vulnerability, CVE-2025-24054, which lets hackers leak NTLMv2-SSP hashes using...
Read More
CVE-2025-24054  Hackers Exploiting NTLM Spoofing Windows Vuln the in Wild

Bengaluru firm got ransomware attack, Hacker demanded $70,000

Bengaluru's Whiteboard Technologies Pvt Ltd was hit by a ransomware attack, with hackers demanding a ransom of up to $70,000...
Read More
Bengaluru firm got ransomware attack, Hacker demanded $70,000

MITRE warns: U.S. Govt. Funding for MITRE’s CVE Ends Today

MITRE Vice President Yosry Barsoum warned that U.S. government funding for the Common Vulnerabilities and Exposures (CVE) and Common Weakness...
Read More
MITRE warns: U.S. Govt. Funding for MITRE’s CVE Ends Today

PwC exits more than a dozen countries in push to avoid scandals: FT reports

PwC has ceased operations in more than a dozen countries that its global bosses have deemed too small, risky or...
Read More
PwC exits more than a dozen countries in push to avoid scandals: FT reports

CVE-2024-5655 (CVSS 9.6) – Run Pipelines as Any User:

A serious vulnerability (CVE-2024-5655) affects GitLab versions from 15.8 and later. This vulnerability allows attackers to initiate pipelines as a different user in specific situations, creating a major security threat. To fix this, the patch changes how Merge Request (MR) re-targeting works. Users will need to manually start pipelines when merging a target branch. Moreover, the default setting now disables GraphQL authentication with CI_JOB_TOKEN, so other authentication methods must be used.

CVE-2024-4901 (CVSS 8.7) – Stored XSS in Imported Project’s Commit Notes:

Issue CVE-2024-4901 is a stored Cross-Site Scripting (XSS) vulnerability. It can be exploited through malicious commit notes in imported projects, affecting versions from 16.9 onwards. If successful, attackers could execute arbitrary scripts in the user’s session.

CVE-2024-4994 (CVSS 8.1) – CSRF on GraphQL API IntrospectionQuery:

The Cross-Site Request Forgery (CSRF) vulnerability (CVE-2024-4994) affects all versions from 16.1.0 onwards. This issue allows attackers to execute arbitrary GraphQL mutations, potentially leading to unauthorized actions within the GitLab instance.

Additional Vulnerabilities Addressed:

GitLab’s latest releases also address several other significant vulnerabilities:

CVE-2024-6323 (CVSS 7.5): Unauthorized access to private repository content in public projects.

CVE-2024-2177 (CVSS 6.8): Cross-window forgery in user application OAuth flow.

CVE-2024-5430 (CVSS 6.8): Ignoring group merge request approval policies.

CVE-2024-4025 (CVSS 6.5): ReDoS vulnerability in custom markdown pages.

CVE-2024-3959 (CVSS 6.5): Unauthorized access to private job artifacts.

CVE-2024-4557 (CVSS 6.5): Security fixes for Banzai pipeline.

CVE-2024-1493 (CVSS 6.5): ReDoS in dependency linker.

CVE-2024-1816 (CVSS 5.3): Denial of Service (DoS) using crafted OpenAPI files.

CVE-2024-2191 (CVSS 5.3): Disclosure of Merge Request titles.

CVE-2024-3115 (CVSS 4.3): Access issues to epics without an SSO session.

CVE-2024-4011 (CVSS 3.1): Non-project members promoting key results to objectives.

Urgent Upgrade Recommendation

GitLab has not found any evidence of these vulnerabilities being used by attackers, but it is important to take immediate action because these flaws are very serious. Users of GitLab CE and EE should upgrade to versions 17.1.1, 17.0.3, or 16.11.5 right away to make sure their installations are secure and stable.

Check Also

CVE-2025-20236
Cisco Patches Unauthenticated RCE Flaw in Webex App

Cisco issued a security advisory about a serious vulnerability in its Webex App that allows …

Leave a Reply

Your email address will not be published. Required fields are marked *