GitLab patches high severity account takeover, missing auth issues
GitLab发布安全更新修复多个漏洞,包括账户接管和恶意任务注入。版本18.0.2等已发布,建议立即升级。漏洞涉及HTML注入、授权问题、XSS及DoS攻击。攻击者可能利用这些漏洞获取敏感信息。GitLab拥有3000万用户和大量企业客户。 2025-6-12 12:30:26 Author: www.bleepingcomputer.com(查看原文) 阅读量:29 收藏

GitLab

GitLab has released security updates to address multiple vulnerabilities in the company's DevSecOps platform, including ones enabling attackers to take over accounts and inject malicious jobs in future pipelines.

The company released GitLab Community and Enterprise versions 18.0.2, 17.11.4, and 17.10.8 to address these security flaws and urged all admins to upgrade immediately.

"These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately," the company warned. "GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action."

On Wednesday, GitLab patched an HTML injection issue tracked as CVE-2025-4278 that can let remote attackers take over accounts by injecting malicious code into the search page.

It also released patches for a missing authorization issue (CVE-2025-5121) that impacts GitLab Ultimate EE and allows remote threat actors to inject malicious CI/CD jobs into any project's future CI/CD pipelines.

GitLab pipelines are a Continuous Integration/Continuous Deployment (CI/CD) system feature that lets users sequentially build, test, or deploy code changes or automatically run processes and tasks in parallel.

However, successful exploitation requires attackers to have authenticated access to GitLab instances with a GitLab Ultimate license.

The company also patched a cross-site scripting vulnerability (CVE-2025-2254) that could let successful attackers act in the context of a legitimate user and a denial of service (DoS) flaw (CVE-2025-0673) that can allow malicious actors to trigger infinite redirect loops, causing memory exhaustion and denying access to legitimate users.

GitLab repositories are often targeted in attacks because of the sensitive information and data they contain, as proven by recent breaches reported by multinational car-rental company Europcar Mobility Group and education giant Pearson, which had their GitLab repos compromised since the start of the year.

GitLab's DevSecOps platform has over 30 million registered users and is utilized by more than 50% of Fortune 100 companies, including Goldman Sachs, Airbus, T-Mobile, Lockheed Martin, Nvidia, and UBS.

Tines Needle

Why IT teams are ditching manual patch management

Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.


文章来源: https://www.bleepingcomputer.com/news/security/gitlab-patches-high-severity-account-takeover-missing-auth-issues/
如有侵权请联系:admin#unsafe.sh