CVE-2024-8114: GitLab Vulnerability Allows Privilege Escalation
GitLab has released critical security updates to address multiple vulnerabilities affecting its Community Edition (CE) and Enterprise Edition (EE) products. Versions 17.6.1, 17.5.3, and 17.4.5 contain important bug and security fixes, including patches for a high severity privilege escalation vulnerability.
“We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible,” GitLab said in its security advisory.
The most severe vulnerability, identified as CVE-2024-8114, could allow an attacker with access to a victim’s Personal Access Token (PAT) to escalate privileges. This vulnerability has a CVSSv3 score of 8.2 and affects all versions of GitLab from 8.12 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1.
Other vulnerabilities addressed in this release include:
- Denial of Service (DoS) vulnerabilities: Multiple DoS vulnerabilities have been patched, including one that could be triggered by viewing a maliciously crafted
cargo.toml
file (CVE-2024-8237) and another related to the Harbor registry integration (CVE-2024-8177). - Unintended access to usage data: A vulnerability (CVE-2024-11669) that could allow unauthorized access to sensitive data via scoped tokens has been mitigated.
- Resource exhaustion and denial of service: A vulnerability (CVE-2024-11828) that could allow an attacker to create a DoS condition by sending crafted API calls has been addressed.
- Streaming endpoint vulnerability: A vulnerability (CVE-2024-11668) that could allow long-lived connections to bypass authentication controls has been patched.
GitLab has credited security researchers pwnie, l33thaxor, a92847865, and luryus for reporting some of these vulnerabilities through its HackerOne bug bounty program. Internal GitLab team members Dylan Griffith and Heinrich Lee Yu were also credited with discovering vulnerabilities.
GitLab urges all users to update their installations to the latest versions immediately to mitigate these security risks.