GitLab Patches a Critical Account Takeover Vulnerability

June 6, 2022 

GitLab Patches a Critical Account Takeover Vulnerability

GitLab has released a critical security update, patching a critical account takeover vulnerability, as well as 7 other, less severe vulnerabilities.

The critical vulnerability affects only GitLab Enterprise Edition (EE) under certain conditions, described in the next section below.

The Critical Vulnerability

  • CVE-2022-1680, (CVSS 3.0: 9.9, Critical Severity) – An account takeover issue has been discovered in GitLab EE, When group SAML SSO is configured, the SCIM feature (available only on Premium+ subscriptions) may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users’ email addresses via SCIM to an attacker controlled email address and thus – in the absence of 2FA – take over those accounts.

Affected Products

  • GitLab Enterprise Edition:
    • Versions 11.10, prior to version 14.9.5.
    • Versions 14.10, prior to version 14.10.4.
    • Versions 15.0, prior to version 15.0.1.

Mitigation

CYREBRO recommends:

  • Updating relevant products to their latest available versions.
  • Enforcing 2FA on all GitLab users.

References: GitLab Advisory.

Sign Up for Updates