-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4036
            GitLab Security Release: 12.4.1, 12.3.6, and 12.2.9
                              31 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           GitLab Community Edition (CE)
                   Gitlab Enterprise Edition (EE)
Publisher:         Gitlab
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Virtualisation
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Modify Arbitrary Files          -- Existing Account
                   Cross-site Scripting            -- Existing Account
                   Denial of Service               -- Existing Account
                   Provide Misleading Information  -- Existing Account
                   Access Confidential Data        -- Existing Account
                   Unauthorised Access             -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-18463 CVE-2019-18462 CVE-2019-18461
                   CVE-2019-18460 CVE-2019-18459 CVE-2019-18458
                   CVE-2019-18457 CVE-2019-18456 CVE-2019-18455
                   CVE-2019-18454 CVE-2019-18453 CVE-2019-18452
                   CVE-2019-18451 CVE-2019-18450 CVE-2019-18449
                   CVE-2019-18448 CVE-2019-18447 CVE-2019-18446

Original Bulletin: 
   https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/

- --------------------------BEGIN INCLUDED TEXT--------------------

GitLab Security Release: 12.4.1, 12.3.6, and 12.2.9

Today we are releasing versions 12.4.1, 12.3.6, and 12.2.9 for GitLab Community
Edition (CE) and Enterprise Edition (EE).

These versions contain important security fixes, and we strongly recommend that
all GitLab installations be upgraded to one of these versions immediately.

The vulnerability details will be made public on our issue tracker in
approximately 30 days.

Please read on for more information regarding this release.

Source branch of a MR could be removed by an unauthorised user

An unauthorised member of the target project could delete the source branch of
MR. The issue is now mitigated in the latest release and is assigned
CVE-2019-18446.

Thanks to @ngalog for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab CE/EE 8.15 and up.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Private group members could be listed

An unauthorised user could view the members of a private group. The issue is
now mitigated in the latest release and is assigned CVE-2019-18447.

Thanks to @ngalog for responsibly reporting this vulnerability to us.

Versions Affected

Affects all previous GitLab CE/EE versions.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Disclosure of System Notes via Elasticsearch integration

System Notes would be disclosed with the Comments Search feature provided by
Elasticsearch integration. The issue is now mitigated in the latest release and
is assigned CVE-2019-18460.

Thanks to @rpadovani for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab 8.8.3 and later

Remediation

We strongly recommend that all installations running an affected version above
with enabled Elasticsearch integration are upgraded to the latest version as
soon as possible.

Disclosure of Private Comments via Elasticsearch integration

Private comments in restricted groups would be disclosed with the Search
feature provided by Elasticsearch integration. The issue is now mitigated in
the latest release and is assigned CVE-2019-18456.

Thanks to @xanbanx for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab EE 8.17 and later.

Remediation

We strongly recommend that all installations running an affected version above
with enabled Elasticsearch integration are upgraded to the latest version as
soon as possible.

Confirm existence of private repositories

By using brute-force an unauthorised user could check if a private repository
exists. The issue is now mitigated in the latest release and is assigned
CVE-2019-18448.

Thanks to @brxxn for responsibly reporting this vulnerability to us.

Versions Affected

Affects all previous GitLab CE/EE versions.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Private group membership could be disclosed

Unauthorised users were able to read private groups membership using the
autocomplete endpoint. The issue is now mitigated in the latest release and is
assigned CVE-2019-18449.

Thanks to @ngalog for responsibly reporting this vulnerability to us.

Versions Affected

Affects all previous GitLab CE/EE versions.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Disclosure of Project Labels

Project labels could be disclosed through the GitLab API to unauthorised users.
The issue is now mitigated in the latest release and is assigned CVE-2019-18450
.

Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to
us.

Versions Affected

Affects all previous GitLab CE/EE versions.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Disclosure of Private Project Path and Labels

When an issue was moved to a public project from a private one, the associated
private labels and the private project namespace would be disclosed through the
GitLab API. The issue is now mitigated in the latest release and is assigned
CVE-2019-18452.

Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to
us.

Versions Affected

Affects GitLab CE/EE 11.3 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Uncontrolled Resource Consumption due to Nested GraphQL Queries

Nested GraphQL queries could be built so that it resulted a denial of service
of the affected page. The issue is now mitigated in the latest release and is
assigned CVE-2019-18455.

Thanks to @freddd for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab CE/EE 11 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Improper access control on comments

An authorization issue discovered allowed a demoted user to add comments via
email. The issue is now mitigated in the latest release and is assigned
CVE-2019-18453.

Thanks to @hx01 for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab CE/EE 11.6 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Sentry Token Access Control

An authorization issue discovered in the Sentry tokens handling that allowed
access to a demoted user . The issue is now mitigated in the latest release and
is assigned CVE-2019-18457.

Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to
us.

Versions Affected

Affects GitLab CE/EE 11.8 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Authorisation check for Project Transfer option

An authorization check needed for transfer projects to another group feature
allowed users with developer rights to move projects. The issue is now
mitigated in the latest release and is assigned CVE-2019-18458.

Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to
us.

Versions Affected

Affects GitLab CE/EE 10.5 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

XSS in Wiki Pages Using RDoc

The link validation for RDoc wiki pages contained an issue that could get
exploited to a persistent XSS vulnerability. The issue is now mitigated in the
latest release and is assigned CVE-2019-18454.

Thanks to @vakzz for responsibly reporting this vulnerability to us.

Versions Affected

Affects GitLab CE/EE 10.5 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Untrusted Input could be used for Internal Redirect

An internal review determined an issue in the InternalRedirect filtering
allowing for open redirect attacks. The issue is now mitigated in the latest
release and is assigned [CVE-2019-18451(https://cve.mitre.org/cgi-bin/
cvename.cgi-name=CVE-2019-18451).

Versions Affected

Affects GitLab CE/EE 10.7.4 and later

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Access control for protected environments

An internal review determined that groups could maintain access to protected
environments even after removal. The issue is now mitigated in the latest
release and is assigned CVE-2019-18459.

Versions Affected

Affects GitLab CE/EE 11.3 to 12.3.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Private Sub Group path Disclosure

The private sub group path was disclosed when a sub group epic was added to a
public group. The issue is now mitigated in the latest release and is assigned
CVE-2019-18461.

Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to
us.

Versions Affected

Affects GitLab CE/EE 12.0 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Disclosure of Group Packages List

An issue was found that allowed an unauthorised user to list the packages of a
group. The issue is now mitigated in the latest release and is assigned
CVE-2019-18463.

Thanks to @ashish_r_padelkar for responsibly reporting this vulnerability to
us.

Versions Affected

Affects GitLab CE/EE 12.0 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Private Repository Name Disclosure

An issue was found that allowed an unauthorised user to confirm the name of a
private repository. The issue is now mitigated in the latest release and is
assigned CVE-2019-18462.

Thanks to @mclaren650sspider for responsibly reporting this vulnerability to
us.

Versions Affected

Affects GitLab CE/EE 12.2 and later.

Remediation

We strongly recommend that all installations running an affected version above
are upgraded to the latest version as soon as possible.

Updating

To update GitLab, see the Update page.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=MSNP
-----END PGP SIGNATURE-----