share_log

'GitLab Warns Of Critical Pipeline Execution Vulnerability' - Bleeping Computer

'GitLab Warns Of Critical Pipeline Execution Vulnerability' - Bleeping Computer

'GitLab警告存在关键的Pipeline执行漏洞' - Bleeping Computer
Benzinga ·  09/12 10:57

GitLab has released critical updates to address multiple vulnerabilities, the most severe of them (CVE-2024-6678) allowing an attacker to trigger pipelines as arbitrary users under certain conditions.

GitLab 已发布重要更新以解决多个漏洞,其中最严重的漏洞(CVE-2024-6678)允许攻击者在特定条件下以任意用户身份触发管道。

The release is for versions 17.3.2, 17.2.5, and 17.1.7 for both GitLab Community Edition (CE) and Enterprise Edition (EE), and patches a total of 18 security issues as part of the bi-monthly (scheduled) security updates.

该版本适用于GitLab社区版(CE)和企业版(EE)的17.3.2、17.2.5和17.1.7版本,作为每两个月(预定)安全更新的一部分,共修补了18个安全问题。

With a critical severity score of 9.9, the CVE-2024-6678 vulnerability could enable an attacker to execute environment stop actions as the owner of the stop action job.

CVE-2024-6678 漏洞的严重性分数为 9.9,可让攻击者以停止操作任务的所有者的身份执行环境停止操作。

The severity of the flaw comes from its potential for remote exploitation, lack of user interaction, and the low privileges required for exploiting it.

该漏洞的严重性来自于其可能被远程利用、缺乏用户交互以及利用该漏洞所需的低权限。

GitLab warns that the issue affects CE/EE versions from 8.14 up to 17.1.7, versions from 17.2 prior to 17.2.5, and versions from 17.3 prior to 17.3.2.

GitLab 警告说,该问题影响 8.14 至 17.1.7 的 CE/EE 版本、17.2.5 之前的 17.2 版本以及 17.3.2 之前的 17.3 版本。

GitLab pipelines are automated workflows used to build, test, and deploy code, part of GitLab's CI/CD (Continuous Integration/Continuous Delivery) system.

GitLab 管道是用于构建、测试和部署代码的自动化工作流程,是 GitLab 的 CI/CD(持续集成/持续交付)系统的一部分。

They are designed to streamline the software development process by automating repetitive tasks and ensuring that changes to the codebase are tested and deployed consistently.

它们旨在通过自动执行重复任务并确保对代码库的更改进行一致的测试和部署来简化软件开发流程。

GitLab addressed arbitrary pipeline execution vulnerabilities multiple times in recent months, including in July 2024, to fix CVE-2024-6385, in June 2024, to fix CVE-2024-5655, and in September 2023 to patch CVE-2023-5009, all rated critical.

最近几个月,GitLab 多次修复任意管道执行漏洞,包括在 2024 年 7 月修复 CVE-2024-6385,在 2024 年 6 月修复 CVE-2024-5655,以及 2023 年 9 月修复 CVE-2023-5009,这些漏洞都被评为严重。

The bulletin also lists four high-severity issues with scores between 6.7 – 8.5, that could potentially allow attackers to disrupt services, execute unauthorized commands, or compromise sensitive resources. The issues are summarized as follows:

该公告还列出了四个分数介于 6.7 到 8.5 之间的高严重性问题,这些问题可能允许攻击者中断服务、执行未经授权的命令或破坏敏感资源。这些问题概述如下:

  • CVE-2024-8640: Due to improper input filtering, attackers could inject commands into a connected Cube server via YAML configuration, potentially compromising data integrity. Impacts GitLab EE starting from 16.11.
  • CVE-2024-8635: Attackers could exploit a Server-Side Request Forgery (SSRF) vulnerability by crafting a custom Maven Dependency Proxy URL to make requests to internal resources, compromising internal infrastructure. Affects GitLab EE starting from 16.8.
  • CVE-2024-8124: Attackers could trigger a DoS attack by sending a large 'glm_source' parameter, overwhelming the system and making it unavailable. Impacts GitLab CE/EE starting from 16.4.
  • CVE-2024-8641: Attackers could exploit a CI_JOB_TOKEN to gain access to a victim's GitLab session token, allowing them to hijack a session. Affects GitLab CE/EE starting from 13.7.
  • CVE-2024-8640:由于输入过滤不当,攻击者可以通过 YAML 配置向连接的 Cube 服务器注入命令,这可能会损害数据完整性。从 16.11 开始影响 GitLab EE。
  • CVE-2024-8635:攻击者可以通过制作自定义 Maven 依赖代理 URL 来利用服务器端请求伪造 (SSRF) 漏洞,向内部资源发出请求,从而危及内部基础架构。从 16.8 开始影响 GitLab EE。
  • CVE-2024-8124:攻击者可以通过发送一个大型的 “glm_source” 参数来触发 DoS 攻击,使系统不堪重负并使其不可用。从 16.4 版本开始影响 GitLab CE/EE。
  • CVE-2024-8641:攻击者可以利用 CI_JOB_TOKEN 来获得对受害者的 GitLab 会话令牌的访问权限,从而允许他们劫持会话。从 13.7 开始影响 GitLab CE/EE。

For update instructions, source code, and packages, check out GitLab's official download portal. The latest GitLab Runner packages are available here.

有关更新说明、源代码和软件包,请访问 GitLab 的官方下载门户。最新的 GitLab Runner 软件包可在此处获取。

声明:本内容仅用作提供资讯及教育之目的,不构成对任何特定投资或投资策略的推荐或认可。 更多信息
    抢沙发