Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.6260 GitLab Security Release: 15.6.1, 15.5.5 and 15.4.6 1 December 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: GitLab Community Edition (CE) GitLab Enterprise Edition (EE) Publisher: GitLab Operating System: Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade CVE Names: CVE-2022-4206 CVE-2022-4205 CVE-2022-4201 CVE-2022-4054 CVE-2022-3902 CVE-2022-3820 CVE-2022-3740 CVE-2022-3572 CVE-2022-3482 CVE-2022-3478 Original Bulletin: https://about.gitlab.com/releases/2022/11/30/security-release-gitlab-15-6-1-released/ Comment: CVSS (Max): 7.7 CVE-2022-4206 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) CVSS Source: GitLab Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- GitLab Security Release: 15.6.1, 15.5.5 and 15.4.6 Learn more about GitLab Security Release: 15.6.1, 15.5.5 and 15.4.6 for GitLab Community Edition (CE) and Enterprise Edition (EE). Today we are releasing versions 15.6.1, 15.5.5 and 15.4.6 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version. GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our security FAQ. You can see all of our regular and security release blog posts here. In addition, the issues detailing each vulnerability are made public on our issue tracker 30 days after the release in which they were patched. We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more best practices in securing your GitLab instance in our blog post. Recommended Action We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible. When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected. Table of Fixes Title Severity DAST API scanner exposes Authorization headers in vulnerabilities high Group IP allow-list not fully respected by the Package Registry medium Deploy keys and tokens may bypass External Authorization service if it medium is enabled Repository import still allows to import 40 hexadecimal branches medium Webhook secret tokens leaked in webhook logs medium Maintainer can leak webhook secret token by changing the webhook URL medium Cross-site scripting in Jira Integration affecting self-hosted medium instances without strict CSP Release names visible in public projects despite release set as medium project members only Sidekiq background job DoS by uploading malicious NuGet packages medium SSRF in Web Terminal advertise_address low DAST API scanner exposes Authorization headers in vulnerabilities A sensitive information leak issue has been discovered in all versions of DAST API scanner from 1.6.50 prior to 2.0.102, exposing the Authorization header in the vulnerability report. This is a high severity issue (CVSS:3.1/AV:N/AC:L/ PR:L/UI:N/S:C/C:H/I:N/A:N, 7.7). It is now mitigated in the latest release of DAST API scanner and is assigned CVE-2022-4206. This vulnerability has been discovered internally by the GitLab team. Group IP allow-list not fully respected by the Package Registry An issue has been discovered in GitLab affecting all versions starting from 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. GitLab was not performing correct authentication with some Package Registries when IP address restrictions were configured, allowing an attacker already in possession of a valid Deploy Token to misuse it from any location. This is a medium severity issue (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N, 6.5). It is now mitigated in the latest release and is assigned CVE-2022-3820. This vulnerability has been discovered internally by the GitLab team. Deploy keys and tokens may bypass External Authorization service if it is enabled An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. A group owner may be able to bypass External Authorization check, if it is enabled, to access git repositories and package registries by using Deploy tokens or Deploy keys. This is a medium severity issue (CVSS:3.1/AV:N/AC:L/PR:H /UI:N/S:U/C:H/I:H/A:N, 6.5). It is now mitigated in the latest release and is assigned CVE-2022-3740. Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program. Repository import still allows to import 40 hexadecimal branches In GitLab EE/CE before 15.6.1, 15.5.5 and 15.4.6 using a branch with a hexadecimal name could override an existing hash. This is a medium severity issue (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L, 6.3). It is now mitigated in the latest release and is assigned CVE-2022-4205. This vulnerability has been discovered internally by the GitLab team. Webhook secret tokens leaked in webhook logs An issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to unmask webhook secret tokens by reviewing the logs after testing webhooks. This is a medium severity issue (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N, 5.5). It is now mitigated in the latest release and is assigned CVE-2022-3902. Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program. Maintainer can leak webhook secret token by changing the webhook URL An issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to leak a webhook secret token by changing the webhook URL to an endpoint that allows them to capture request headers. This is a medium severity issue (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N, 5.5). It is now mitigated in the latest release and is assigned CVE-2022-4054. Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program. Cross-site scripting in Jira Integration affecting self-hosted instances without strict CSP A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which could lead to a reflected XSS that allowed attackers to perform arbitrary actions on behalf of victims. This is a medium severity issue (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, 5.4). It is now mitigated in the latest release and is assigned CVE-2022-3572. Thanks ryotak for reporting this vulnerability through our HackerOne bug bounty program. Release names visible in public projects despite release set as project members only An improper access control issue in GitLab CE/EE affecting all versions from 11.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allowed an unauthorized user to see release names even when releases were set to be restricted to project members only. This is a medium severity issue (CVSS:3.1/ AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, 5.3). It is now mitigated in the latest release and is assigned CVE-2022-3482. Thanks ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program. Sidekiq background job DoS by uploading malicious NuGet packages An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible to trigger a DoS attack by uploading a malicious NuGet package. This is a medium severity issue (CVSS:3.1/ AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, 4.3). It is now mitigated in the latest release and is assigned CVE-2022-3478. Thanks luryus for reporting this vulnerability through our HackerOne bug bounty program. SSRF in Web Terminal advertise_address A blind SSRF in GitLab CE/EE affecting all from 11.3 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 allows an attacker to connect to local addresses when configuring a malicious GitLab Runner. This is a low severity issue (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N, 3.5). It is now mitigated in the latest release and is assigned CVE-2022-4201. This vulnerability has been discovered internally by the GitLab team. Update xmlsoft/libxml2 xmlsoft/libxml2 has been updated to version 2.10.3 in order to mitigate security issues. Versions affected Affects all versions of GitLab Omnibus from 13.6.6. Update haxx/curl haxx/curl has been updated to version 7.86.0 in order to mitigate security issues. Versions affected Affects all versions of GitLab Omnibus 15.4 and 15.6. Update ruby ruby has been updated to version 2.7.6 in order to mitigate security issues. Versions affected Affects all versions of GitLab Omnibus and GitLab Chart. Update ncurses ncurses has been updated to version 6.3-20220416 to mitigate security issues. Versions affected Affects all versions of GitLab Omnibus. Update zlib zlib has been updated to version 1.2.13 to mitigate security issues. Versions affected Affects all versions of GitLab Omnibus prior to 15.7. Update rsync rsync has been updated to version 3.2.6 to mitigate security issues. Versions affected Affects all versions of GitLab Omnibus 15.3, 15.4, and 15.5. Update PostgreSQL PostgreSQL has been updated to versions 12.12 and 13.8 to mitigate security issues. By default Omnibus automatically restarts PostgreSQL after the update. However, if automatic restart is disabled manual restarts would be required. Versions affected Affects all versions of GitLab Omnibus 15.3, 15.4, and 15.5. Backport fix for Gitaly NTP request issue A non-security issue in Gitaly is being backported to this release. Customers that rely on public NTP services such as pool.ntp.org are at risk of receiving rate limited responses due to increased NTP request volume. Every readiness check results in each Praefect node making a request to the configured NTP service. Failed NTP responses result in failed readiness check. If a NTP service is not specified pool.ntp.org is used as the default. Deployments that rely on healthy readiness checks can experience outages. Issue Link: Gitaly 15.4.3 spams NTP requests. Backport fix for Watchdog RssMemoryLimit monitor A non-security issue in Puma is being backported to this release. This affects self-managed instances that uses PumaWorkerKiller. PumaWorkerKiller is disabled by default on Gitlab.com and self-managed instances using helm charts. This means that gitlab.com is not affected. It is enabled by default for omnibus installations and installations from source. Issue Link: Convert memory_limit to bytes for RssMemoryLimit. Updating To update GitLab, see the Update page. To update Gitlab Runner, see the Updating the Runner page. To update DAST API scanner, self-managed customers that are using our built-in DAST CI template after 15.0 can get the latest release from registry.gitlab.com. If using the always pull policy the update will occur automatically. GitLab.com is already running the updated DAST scanner. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY4f+zskNZI30y1K9AQhVJQ//TN5TBOIKD1To1gqtncR7FH/EYh25pvt/ KWWaRUgEj0BdzZtxoHhJGmkdVgq9/AEYdnABh6WW91j5c4VqPo8Wck9v+pneWlHt xXizfZ/IXSgUuXaSBnZoado9aAJxf1/Fq7wtZv8XHKUV5cAOZgdb0O96Ssnco5Kj chHfQD18i/60VAns8GQffAhYgmA2uDHwIoBuumvChQQVZzl2rWXczCcLg+AWV4Zc xpfdMxFNV6eUBqrH5xJZSImUo/97edGtRi/rY+aG7f9JFmJl1NxnoJZaT4WtD6WT YdLhWOiXNbjSjiPXIHOspYeOsxMDEyMRPYsrevLHRVbzyL31NZFFtJXd0BTEUAJ7 UosATKWdSAKapEoROcd7pLRFAZHwYVGPD/WRWNATOx6QxTmvkxIm8x06/HlPDb4N atwmsVS3RehIKax6KkIJll49ATO3B0nSOZRvdW+Njh4cMN7s+lm05aFbDkpljZiS w6w26RxprxAmDIGyfaV2Bso3QC2esdjuP5jT1HUSJMNsmTcdG8pVdQqUeNNcO9x5 taU3gyuKmSAmhdZiNW36S48Lw8l7vBfGQSmmRl7KgXqt8BOC9KOi+40QjPbq1Upl sK585hDDvI//ud/6oQ+BY1sO1+4m0jyRxq+Gw02o0NT/agCegCXTMfAFUZ+qNCes rsx7JgnKlZ0= =uQ+W -----END PGP SIGNATURE-----