Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4036 GitLab Security Release: 12.4.1, 12.3.6, and 12.2.9 31 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: GitLab Community Edition (CE) Gitlab Enterprise Edition (EE) Publisher: Gitlab Operating System: UNIX variants (UNIX, Linux, OSX) Virtualisation Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Modify Arbitrary Files -- Existing Account Cross-site Scripting -- Existing Account Denial of Service -- Existing Account Provide Misleading Information -- Existing Account Access Confidential Data -- Existing Account Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-18463 CVE-2019-18462 CVE-2019-18461 CVE-2019-18460 CVE-2019-18459 CVE-2019-18458 CVE-2019-18457 CVE-2019-18456 CVE-2019-18455 CVE-2019-18454 CVE-2019-18453 CVE-2019-18452 CVE-2019-18451 CVE-2019-18450 CVE-2019-18449 CVE-2019-18448 CVE-2019-18447 CVE-2019-18446 Original Bulletin: https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/ - --------------------------BEGIN INCLUDED TEXT-------------------- GitLab Security Release: 12.4.1, 12.3.6, and 12.2.9 Today we are releasing versions 12.4.1, 12.3.6, and 12.2.9 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. The vulnerability details will be made public on our issue tracker in approximately 30 days. Please read on for more information regarding this release. Source branch of a MR could be removed by an unauthorised user An unauthorised member of the target project could delete the source branch of MR. The issue is now mitigated in the latest release and is assigned CVE-2019-18446. Thanks to @ngalog for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 8.15 and up. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Private group members could be listed An unauthorised user could view the members of a private group. The issue is now mitigated in the latest release and is assigned CVE-2019-18447. Thanks to @ngalog for responsibly reporting this vulnerability to us. Versions Affected Affects all previous GitLab CE/EE versions. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Disclosure of System Notes via Elasticsearch integration System Notes would be disclosed with the Comments Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned CVE-2019-18460. Thanks to @rpadovani for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab 8.8.3 and later Remediation We strongly recommend that all installations running an affected version above with enabled Elasticsearch integration are upgraded to the latest version as soon as possible. Disclosure of Private Comments via Elasticsearch integration Private comments in restricted groups would be disclosed with the Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned CVE-2019-18456. Thanks to @xanbanx for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab EE 8.17 and later. Remediation We strongly recommend that all installations running an affected version above with enabled Elasticsearch integration are upgraded to the latest version as soon as possible. Confirm existence of private repositories By using brute-force an unauthorised user could check if a private repository exists. The issue is now mitigated in the latest release and is assigned CVE-2019-18448. Thanks to @brxxn for responsibly reporting this vulnerability to us. Versions Affected Affects all previous GitLab CE/EE versions. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Private group membership could be disclosed Unauthorised users were able to read private groups membership using the autocomplete endpoint. The issue is now mitigated in the latest release and is assigned CVE-2019-18449. Thanks to @ngalog for responsibly reporting this vulnerability to us. Versions Affected Affects all previous GitLab CE/EE versions. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Disclosure of Project Labels Project labels could be disclosed through the GitLab API to unauthorised users. The issue is now mitigated in the latest release and is assigned CVE-2019-18450 . Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to us. Versions Affected Affects all previous GitLab CE/EE versions. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Disclosure of Private Project Path and Labels When an issue was moved to a public project from a private one, the associated private labels and the private project namespace would be disclosed through the GitLab API. The issue is now mitigated in the latest release and is assigned CVE-2019-18452. Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 11.3 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Uncontrolled Resource Consumption due to Nested GraphQL Queries Nested GraphQL queries could be built so that it resulted a denial of service of the affected page. The issue is now mitigated in the latest release and is assigned CVE-2019-18455. Thanks to @freddd for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 11 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Improper access control on comments An authorization issue discovered allowed a demoted user to add comments via email. The issue is now mitigated in the latest release and is assigned CVE-2019-18453. Thanks to @hx01 for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 11.6 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Sentry Token Access Control An authorization issue discovered in the Sentry tokens handling that allowed access to a demoted user . The issue is now mitigated in the latest release and is assigned CVE-2019-18457. Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 11.8 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Authorisation check for Project Transfer option An authorization check needed for transfer projects to another group feature allowed users with developer rights to move projects. The issue is now mitigated in the latest release and is assigned CVE-2019-18458. Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 10.5 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. XSS in Wiki Pages Using RDoc The link validation for RDoc wiki pages contained an issue that could get exploited to a persistent XSS vulnerability. The issue is now mitigated in the latest release and is assigned CVE-2019-18454. Thanks to @vakzz for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 10.5 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Untrusted Input could be used for Internal Redirect An internal review determined an issue in the InternalRedirect filtering allowing for open redirect attacks. The issue is now mitigated in the latest release and is assigned [CVE-2019-18451(https://cve.mitre.org/cgi-bin/ cvename.cgi-name=CVE-2019-18451). Versions Affected Affects GitLab CE/EE 10.7.4 and later Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Access control for protected environments An internal review determined that groups could maintain access to protected environments even after removal. The issue is now mitigated in the latest release and is assigned CVE-2019-18459. Versions Affected Affects GitLab CE/EE 11.3 to 12.3. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Private Sub Group path Disclosure The private sub group path was disclosed when a sub group epic was added to a public group. The issue is now mitigated in the latest release and is assigned CVE-2019-18461. Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 12.0 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Disclosure of Group Packages List An issue was found that allowed an unauthorised user to list the packages of a group. The issue is now mitigated in the latest release and is assigned CVE-2019-18463. Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 12.0 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Private Repository Name Disclosure An issue was found that allowed an unauthorised user to confirm the name of a private repository. The issue is now mitigated in the latest release and is assigned CVE-2019-18462. Thanks to @mclaren650sspider for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE/EE 12.2 and later. Remediation We strongly recommend that all installations running an affected version above are upgraded to the latest version as soon as possible. Updating To update GitLab, see the Update page. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXbpclmaOgq3Tt24GAQhvFBAA2Z4syAJOpMr2xoOjIZ+e694nK2yuxyAZ xgVELpOo7qd0cOJ3JtWH/JaDkBlrES7mqer6c9Nh2hJbLkYFO6MGglJkBxpfOz/X 0YFf8EKPg7YxilfHR147OG+cguvFOjxBNFQFVV515Zs6xzuhdWdCOe6rHMzVZ90N 1MJLG9kMJ/HfwLPXYtKJebgbLY5W4iegFH5H+asc81BBRgC69a+aOoxXYEKe4goo 3cQE6t52FrCwH/m6CUEl1pxuK+Ak6lWeOjO311e0mRCZRJMiEdyUo26d3eq6Ccx1 yM881M7EBkXPQPbOCxpZYRijaaK4dYj9C0+z+J6DCGyniT2+XUHQfoC1jhnPSVWF CDjvtAgggTqASmRw2J3ouCuArEBosMLae4tQzC5ILFTRZAF+QSUYz5hBXVbombUz gPzWOgAYzI63FKFemctdrMMq/ua6hipSU7ZQPq+oAYbt6F7EBc4ULi9hicpWz7iq gQojrgGfsTyl2n8jDQhhW/4kRXTEkY2L6CocAmgPyaUE02yIkaizuasgjeZMWueh x0JUJNh+F+8AosSGam/QG5M21knIyO1Ssi903RYDNAgwYKJc4gSBNlKRBoBKnkqn mr5X4OMAAnk/19abj34Ve83R1roJQdVHc/tJ0Llx4WH30LnYuZcz3QxtryOgZfQ8 4y8eO8ctSBc= =MSNP -----END PGP SIGNATURE-----