Arbitrary File Write Vulnerability Affects GitLab Servers

CVE-2024-0402

9.9CRITICAL

Key Information

Vendor
Gitlab
Status
Gitlab
Vendor
CVE Published:
26 January 2024

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

What is CVE-2024-0402?

CVE-2024-0402 is a significant vulnerability found in GitLab, a widely used platform for version control and collaborative development. The vulnerability affects various versions of GitLab Community Edition (CE) and Enterprise Edition (EE) released before specific patch updates were implemented. It allows authenticated users to write files to arbitrary locations on the GitLab server while creating a workspace, which could lead to unauthorized access, data manipulation, or even system compromise. If exploited, this vulnerability could severely undermine the integrity and security of organizations reliant on GitLab for managing their software development processes.

Technical Details

This vulnerability stems from a failure in input validation during the file-writing process in GitLab. Specifically, it affects all versions from 16.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Because it only requires authentication to exploit, it becomes particularly concerning in environments where multiple users have access, potentially increasing the attack surface. Once an attacker writes files to arbitrary locations, they can manipulate essential configurations or introduce malicious scripts, thereby compromising the server environment. The issue was outlined in GitLab's security advisory following its discovery and subsequent tracking on GitLab's issue page.

Impact of the Vulnerability

  1. Unauthorized File Access: The vulnerability allows attackers to write files to any location on the GitLab server. This could lead to unauthorized access to sensitive files, resulting in potential data leaks or unauthorized modifications.

  2. System Compromise: By manipulating configurations or uploading malicious scripts, an attacker could gain greater control over the GitLab server, possibly leading to further exploits or persistent access that could affect the entire system.

  3. Operational Disruption: Exploiting this vulnerability could disrupt services hosted on GitLab, making projects inaccessible and potentially affecting productivity. The ramifications could extend beyond the GitLab environment, impacting other systems that depend on it for development and deployment workflows.

Affected Version(s)

GitLab < 16.5.8

GitLab < 16.6.6

GitLab < 16.7.4

News Articles

Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw - Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Prioritizing cybercrime intelligence for effective

11 months ago

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

New GitLab vulnerability exposes critical file overwrite risk. Users urged to update immediately to safeguard their data and workflows.

11 months ago

2nd critical GitLab patch of 2024 fixes arbitrary file writing bug

CVE-2024-0402, CVSS score 9.9, may affect more than 4,800 unpatched GitLab servers.

11 months ago

Refferences

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 😈

    Used in Ransomware

  • 👾

    Exploit known to exist

  • Vulnerability started trending

  • First article discovered by Penetration Testing

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database7 News Article(s)

Credit

This vulnerability has been discovered internally by GitLab team member [joernchen](https://gitlab.com/joernchen)
.