Kwetsbaarheid

Gitlab vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on April 2, 2022.

Clip path group@2x

T-Update

Informatie over kwetsbaarheden

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on April 2, 2022.

Update April 2, 2022

12:00 | On March 31st, Gitlab has released their monthly security update. This security update solves one critical vulnerability, identified as CVE-2022-1162. This vulnerability describes hardcoded passwords set for user accounts registered using an OmniAuth provider.

It is advised to apply this security patch as soon as possible. Additionally, it is advised to reset the password of impacted user accounts. Gitlab has released a script to identify potentially impacted user accounts.

Are my systems vulnerable?

The following versions of Gitlab Community Edition and Enterprise Edition are vulnerable:

  • 14.7 prior to 14.7.7
  • 14.8 prior to 14.8.5
  • 14.9 prior to 14.9.2

What can I do to reduce or stop potential damage?

Gitlab has released security updates mitigating this and several other vulnerabilities. It is strongly advised to upgrade as soon as possible to one of the following versions:

  • 14.7.7
  • 14.8.5
  • 14.9.2

Additionally, it is advised to reset the password for potentially impacted user accounts. Gitlab has released a script to identify those user accounts.

Cyberveiligheid op maat

Achtergrond

The monthly security update fixes multiple vulnerabilities. The most severe one, which is the subject of this advisory, is CVE-2022-1162. This vulnerability describes hardcoded passwords set for user accounts registered using the OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab Community Edition and Enterprise Edition. The CVE has a CVSS score of 9.1. The CVSS scale runs from 0 to 10.

Risico

The use of hardcoded passwords may allow attackers to take over user accounts configured with those hardcoded passwords.

Advies

Ellipse 6

Schrijf je in voor T-Updates

Ontvang elke woensdag het laatste nieuws over malware of kwetsbaarheden in je mail

More than 1,000 organizations have already joined us.

Tesorion uses your data to send the requested information. In addition, your data may be used for commercial follow-up. You can unsubscribe from this at any time via the link in the email. For more information, read our privacy policy.

Opt-in-EN
Ellipse 6