A critical vulnerability in GitLab CE/EE can be easily exploited by attackers to reset GitLab user account passwords.
Users who have two-factor authentication enabled on their account are safe from account takeover.
CVE-2023-7028 was reported through the company's bug bounty program and has been fixed in GitLab CE and EE versions 16.7.2, 16.6.4, 16.5.6.
GitLab advises admins of self-managed GitLab instances to upgrade to a patched version immediately, and to enable 2FA for all GitLab accounts.
GitLab.com is already running the patched version, and the company has instituted new security measures to prevent vulnerabilities such as CVE-2023-7028 to crop up in the future.
CVE-2023-5356, a critical bug caused by incorrect authorization checks, which may allow a user to abuse Slack/Mattermost integrations to execute slash commands as another user.
CVE-2023-4812 could allow attackers to bypass the required CODEOWNERS approval by adding changes to a previously approved merge request.
CVE-2023-6955, which may allow an attacker to create a workspace in one group that is associated with an agent from another group, and.
CVE-2023-2030, which could allow an attacker to modify the metadata of signed commits.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Fri, 12 Jan 2024 11:43:05 +0000