GitLab has released new updates for both its Community Edition (CE) and Enterprise Edition (EE) to address several vulnerabilities, including a high-severity cross-site scripting (XSS) flaw. This critical vulnerability, tracked as CVE-2024-5067, allows attackers to execute arbitrary code in the context of the logged-in user if the auto-login feature is enabled. The update includes versions 17.2.1, 17.1.3, and 17.0.5, which also fix other security issues identified in the affected products.
In addition to the XSS vulnerability, the updates address medium-severity issues such as unauthorized exposure of job artifacts and project-level analytics settings. CVE-2024-7057 and CVE-2024-5067 are two such issues that could lead to unauthorized access or data leakage. The patches also correct a flaw that allowed unauthorized users to view project export files and another that permitted repository import misdirection.
GitLab emphasizes the urgency of applying these updates to all installations to prevent potential exploits and secure the system. The company has released detailed advisories and workarounds to help users upgrade their systems effectively. The patches cover all deployment types, including omnibus, source code, and helm chart installations.
The updates come in response to both internal discoveries and reports from the HackerOne bug bounty program. GitLab’s own team and external researchers have identified these vulnerabilities, highlighting the importance of maintaining updated software to safeguard against security risks. The patches have already been applied to GitLab.com, and users of other deployments are urged to upgrade immediately.