ESB-2018.3627 - [Win][UNIX/Linux] GitLab: Multiple vulnerabilities 2018-11-21

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3627
      GitLab Critical Security Release: 11.5.0-rc12, 11.4.6, 11.3.10
                             21 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           GitLab
Publisher:         GitLab
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Create Arbitrary Files -- Existing Account            
                   Cross-site Scripting   -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19359 CVE-2018-18643 

Original Bulletin: 
   https://about.gitlab.com/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/

- --------------------------BEGIN INCLUDED TEXT--------------------

GitLab Critical Security Release: 11.5.0-rc12, 11.4.6, 11.3.10

Today we are releasing versions 11.5.0-rc12, 11.4.6, and 11.3.10 for GitLab
Community Edition (CE) and Enterprise Edition (EE).

These versions contain a number of important security fixes, and we strongly
recommend that all GitLab installations be upgraded to one of these versions
immediately.

The vulnerability details will be made public on our issue tracker in
approximately 30 days.

Please read on for more information regarding this release.

Persistent XSS Autocompletion

An attribute used in autocompletion contained an input validation and output
encoding issue which resulted in a persistent XSS. The issue is now mitigated
in the latest release and is assigned CVE-2018-18643.

Versions Affected

Affects GitLab CE 11.2 and later.

Remediation

We strongly recommend that all installations running an affected version above
to be upgraded to the latest version as soon as possible.

Unauthorized service template creation

The project import feature contained an input validation issue that resulted in
the ability for an unauthorized user to create service templates. The issue is
now mitigated in the latest release and is assigned CVE-2018-19359.

Thanks to @jobert for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab CE 8.9 and later.

Remediation

We strongly recommend that all installations running an affected version above
to be upgraded to the latest version as soon as possible.

Updating

To update, check out our update page.

Updated: 2018-11-20: We have received some questions regarding the XSS
vulnerability in this release and a similar vulnerability reported in October.
The fix in this release does correct an incomplete patch in the October
security release.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW/T+JGaOgq3Tt24GAQgjEBAAwI/2uW0KIAY/eZHsb0tLZ9szLB+8nQWp
ugwWcwUxwgkgNnHYddCynsDYT+3alEuWlZ8hVyx6u+DQ7+6/atjd9eLtx6nO7Lw/
S01JVfmj636lWa+RVj+yEIBsmQxvodRj7PvQEdeZ5d9efcpXjvSVBAYdT/kX+fL4
RsqOgQF+bbPOjgKy1RWuO8KMF+apko0J+lh8CFqkufusYTeOxCUU3YAV3f0F64Px
4zmeXdg576IMpWe0kRdUNCqK1jNHvCk8yA/tEmYFWTRbuQOD4yBcWkkc/NAxPXU2
A19vVD7392+488HtrFbt8wVhcE0qMcNrG19pkxENEmj7dtYASEoqAFImv+dT2PEb
dPM9EgW8kbiyMjYeZUXPeCuPmXqDTsBvI1HBwRAdUu0egGwjWpa5n7kN4tvXlzdt
BmnJqwYN9ZoD98O6lrk6UgLrQGt7SUIB8gvmQBsBdBxl0VmZqFYIMcztx58gYFvA
O7awgLLuLnuxZdTdNTlcErhv+n83IQn7rxfzQA/S4I07j1rxf/XB0NPWLXA7fqFe
40UF00Guc6OUdIFux1hAmKYNcK+Ufoqq2zEP8kzHbk3bVwgJslLvRNuc+BQExqag
frlPf114wbBnrdgoBWQlIEcICIT5Ya8AhBWeATmHTBQ7YkL2rwQQUa4BMJ39fqxR
czEGRvCvHLM=
=tGQM
-----END PGP SIGNATURE-----

« Back to bulletins