GitLab has recently issued critical patch updates for its Community and Enterprise Editions to address multiple severe vulnerabilities that could potentially jeopardize the security and integrity of its platforms. The updates, which include versions 17.3.2, 17.2.5, and 17.1.7, aim to fix high-severity issues, such as code injection vulnerabilities and server-side request forgery. These vulnerabilities, if exploited, could allow attackers to interfere with GitLab’s operations or gain unauthorized access to sensitive information, posing significant risks to affected users.
One of the most concerning vulnerabilities fixed in this update could have enabled attackers to trigger pipelines as arbitrary users, impacting all versions from 8.14 to 17.3.2. Another high-severity flaw involved incomplete input filtering that could permit code injection into connected servers. Additionally, the patch addresses a server-side request forgery vulnerability that could have allowed attackers to make unauthorized requests to internal resources. These critical issues have been assigned CVE identifiers to track and address them effectively.
The new updates also tackle several medium and low-severity vulnerabilities that could lead to unauthorized access, information exposure, or denial of service. Notable fixes include preventing unauthorized users from accessing commit information, protecting against improper handling of CI_JOB_TOKEN, and mitigating risks associated with dependency proxy credentials logged in plaintext. These fixes are crucial for maintaining system stability and ensuring that users are protected from various attack vectors.
GitLab has strongly advised all users to upgrade to the latest versions to safeguard against these vulnerabilities. For those using GitLab Dedicated, no immediate action is necessary as GitLab.com has already been updated with the critical fixes. Users should refer to GitLab’s update page for detailed guidance on applying the patches and subscribe to GitLab’s patch release RSS feed for ongoing updates. This proactive stance underscores GitLab’s commitment to maintaining high-security standards and protecting user data from emerging threats.
Reference: