SB2019051707 - Multiple vulnerabilities in GitLab, Gitlab Community Edition
Published: May 17, 2019 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 22 secuirty vulnerabilities.
1) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2018-19571)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
GitLab CE/EE, versions 8.18 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an SSRF vulnerability in webhooks.
2) Improper Authorization (CVE-ID: CVE-2018-19578)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
GitLab EE, version 11.5 before 11.5.1, is vulnerable to an insecure object reference issue that permits a user with Reporter privileges to view the Jaeger Tracing Operations page.
3) Cross-site scripting (CVE-ID: CVE-2018-19579)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Operations page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Input validation error (CVE-ID: CVE-2018-19580)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
All versions of GitLab prior to 11.5.1, 11.4.8, and 11.3.11 do not send an email to the old email address when an email address change is made.
5) Improper Authorization (CVE-ID: CVE-2018-19581)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
GitLab EE, versions 8.3 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, is vulnerable to an insecure object reference vulnerability that allows a Guest user to set the weight of an issue they create.
6) Information disclosure (CVE-ID: CVE-2018-19582)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
GitLab EE, versions 11.4 before 11.4.8 and 11.5 before 11.5.1, is affected by an insecure direct object reference vulnerability that permits an unauthorized user to publish the draft merge request comments of another user.
7) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2018-19583)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
GitLab CE/EE, versions 8.0 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, would log access tokens in the Workhorse logs, permitting administrators with access to the logs to see another user's token.
8) Improper Authorization (CVE-ID: CVE-2018-19584)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
GitLab EE, versions 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, is vulnerable to an insecure direct object reference vulnerability that allows authenticated, but unauthorized, users to view members and milestone details of private groups.
9) Improper Authorization (CVE-ID: CVE-2018-19569)
The vulnerability allows a remote authenticated user to execute arbitrary code.
GitLab CE/EE, versions 8.8 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an authorization vulnerability that allows access to the web-UI as a user using a Personal Access Token of any scope.
10) Cross-site scripting (CVE-ID: CVE-2018-19570)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via unrecognized HTML tags. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
11) Race condition (CVE-ID: CVE-2018-19572)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
GitLab CE 8.17 and later and EE 8.3 and later have a symlink time-of-check-to-time-of-use race condition that would allow unauthorized access to files in the GitLab Pages chroot environment. This is fixed in versions 11.5.1, 11.4.8, and 11.3.11.
12) Cross-site scripting (CVE-ID: CVE-2018-19573)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via Mermaid. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
13) Cross-site scripting (CVE-ID: CVE-2018-19574)
The vulnerability allows a remote authenticated user to read and manipulate data.
GitLab CE/EE, versions 7.6 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an XSS vulnerability in the OAuth authorization page.
14) Improper Authorization (CVE-ID: CVE-2018-19575)
The vulnerability allows a remote authenticated user to manipulate data.
GitLab CE/EE, versions 10.1 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an insecure direct object reference issue that allows a user to make comments on a locked issue.
15) Improper access control (CVE-ID: CVE-2018-19576)
The vulnerability allows a remote authenticated user to #BASIC_IMPACT#.
GitLab CE/EE, versions 8.6 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an access control issue that allows a Guest user to make changes to or delete their own comments on an issue, after the issue was made Confidential.
16) Cross-site scripting (CVE-ID: CVE-2018-19493)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is a persistent XSS vulnerability in the environment pages due to a lack of input validation and output encoding.
17) Improper access control (CVE-ID: CVE-2018-19494)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an incorrect access vulnerability that allows an unauthorized user to view private group names.
18) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2018-19495)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
An issue was discovered in GitLab Community and Enterprise Edition before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an SSRF vulnerability in the Prometheus integration.
19) Improper access control (CVE-ID: CVE-2018-19496)
The vulnerability allows a remote authenticated user to manipulate data.
An issue was discovered in GitLab Community and Enterprise Edition 10.x and 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an incorrect access control vulnerability that permits a user with insufficient privileges to promote a project milestone to a group milestone.
20) Improper access control (CVE-ID: CVE-2018-19577)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Gitlab CE/EE, versions 8.6 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an incorrect access control vulnerability that displays to an unauthorized user the title and namespace of a confidential issue.
21) Improper access control (CVE-ID: CVE-2019-5883)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
An Incorrect Access Control issue was discovered in GitLab Community and Enterprise Edition 6.0 and later but before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. The issue comments feature could allow a user to comment on an issue which they shouldn't be allowed to.
22) CRLF injection (CVE-ID: CVE-2018-19585)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
GitLab CE/EE versions 8.18 up to 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1 have CRLF Injection in Project Mirroring when using the Git protocol.
Remediation
Install update from vendor's website.
References
- https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/
- https://gitlab.com/gitlab-org/gitlab-ce/issues/53242
- https://gitlab.com/gitlab-org/gitlab-ce/issues/54228
- https://gitlab.com/gitlab-org/gitlab-ce/issues/53917
- https://gitlab.com/gitlab-org/gitlab-ce/issues/39809
- https://gitlab.com/gitlab-org/gitlab-ee/issues/7696
- https://gitlab.com/gitlab-org/gitlab-ee/issues/8180
- http://www.securityfocus.com/bid/109166
- https://gitlab.com/gitlab-org/gitlab-workhorse/issues/182
- https://gitlab.com/gitlab-org/gitlab-ce/issues/52522
- http://www.securityfocus.com/bid/109118
- https://gitlab.com/gitlab-org/gitlab-ce/issues/50319
- http://www.securityfocus.com/bid/109169
- https://gitlab.com/gitlab-org/gitlab-ce/issues/52392
- https://gitlab.com/gitlab-org/gitlab-pages/issues/98
- http://www.securityfocus.com/bid/109164
- https://gitlab.com/gitlab-org/gitlab-ce/issues/45906
- http://www.securityfocus.com/bid/109163
- https://gitlab.com/gitlab-org/gitlab-ce/issues/42057
- http://www.securityfocus.com/bid/109121
- https://gitlab.com/gitlab-org/gitlab-ce/issues/52523
- https://gitlab.com/gitlab-org/gitlab-ce/issues/51238
- http://www.securityfocus.com/bid/109122
- https://gitlab.com/gitlab-org/gitlab-ce/issues/53037
- https://gitlab.com/gitlab-org/gitlab-ce/issues/51262
- https://gitlab.com/gitlab-org/gitlab-ee/issues/8167
- https://gitlab.com/gitlab-org/gitlab-ce/issues/51301
- http://www.securityfocus.com/bid/109179
- https://gitlab.com/gitlab-org/gitlab-ce/issues/52444
- https://about.gitlab.com/blog/categories/releases/