• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Urgent: GitLab Releases Patch for Critical Vulnerabilities – Update ASAP

You are here: Home / Cyber Security News / Urgent: GitLab Releases Patch for Critical Vulnerabilities – Update ASAP

GitLab has unveiled security updates to tackle two critical vulnerabilities, like one that could be exploited to take about accounts without requiring any person conversation.

Tracked as CVE-2023-7028, the flaw has been awarded the greatest severity of 10. on the CVSS scoring method and could facilitate account takeover by sending password reset emails to an unverified email deal with.

The DevSecOps platform explained the vulnerability is the final result of a bug in the email verification approach, which permitted end users to reset their password by means of a secondary email tackle.

It has an effect on all self-managed occasions of GitLab Community Version (CE) and Company Version (EE) –

  • 16.1 prior to 16.1.6
  • 16.2 prior to 16.2.9
  • 16.3 prior to 16.3.7
  • 16.4 prior to 16.4.5
  • 16.5 prior to 16.5.6
  • 16.6 prior to 16.6.4
  • 16.7 prior to 16.7.2

GitLab claimed it addressed the issue in GitLab versions 16.5.6, 16.6.4, and 16.7.2, in addition to backporting the correct to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5. The business additional observed the bug was released in 16.1. on May possibly 1, 2023.

“In just these variations, all authentication mechanisms are impacted,” GitLab claimed. “Also, buyers who have two-aspect authentication enabled are vulnerable to password reset but not account takeover as their next authentication factor is needed to login.”

Also patched by GitLab as element of the newest update is a further critical flaw (CVE-2023-5356, CVSS rating: 9.6), which permits a consumer to abuse Slack/Mattermost integrations to execute slash instructions as an additional consumer.

To mitigate any probable threats, it is really recommended to update the occasions to a patched version as before long as probable and help 2FA, if not previously, notably for people with elevated privileges.

Found this short article fascinating? Stick to us on Twitter  and LinkedIn to go through a lot more special content we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO
Next Post: Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

Copyright © 2025 · AllTech.News, All Rights Reserved.