• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
gitlab releases urgent security patches for critical vulnerability

GitLab Releases Urgent Security Patches for Critical Vulnerability

You are here: Home / General Cyber Security News / GitLab Releases Urgent Security Patches for Critical Vulnerability
September 20, 2023

GitLab has delivered security patches to solve a critical flaw that lets an attacker to operate pipelines as a further user.

The issue, tracked as CVE-2023-5009 (CVSS rating: 9.6), impacts all versions of GitLab Company Edition (EE) setting up from 13.12 and prior to 16.2.7 as nicely as from 16.3 and in advance of 16.3.4.

“It was doable for an attacker to operate pipelines as an arbitrary consumer by means of scheduled security scan guidelines,” GitLab claimed in an advisory. “This was a bypass of CVE-2023-3932 showing more impression.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Prosperous exploitation of CVE-2023-5009 could make it possible for a risk actor to entry sensitive details or leverage the elevated permissions of the impersonated consumer to modify resource code or operate arbitrary code on the procedure, top to critical repercussions.

Security researcher Johan Carlsson (aka joaxcar) has been credited with getting and reporting the flaw. CVE-2023-3932 was resolved by GitLab in early August 2023.

The vulnerability has been dealt with in GitLab variations 16.3.4 and 16.2.7.

Upcoming WEBINARLevel-Up SaaS Security: A Comprehensive Manual to ITDR and SSPM

Continue to be forward with actionable insights on how ITDR identifies and mitigates threats. Find out about the indispensable function of SSPM in ensuring your identification stays unbreachable.

Supercharge Your Expertise

The disclosure arrives as a two-yr-outdated critical GitLab bug (CVE-2021-22205, CVSS rating: 10.) carries on to be actively exploited by danger actors in serious-planet attacks.

Earlier this 7 days, Trend Micro exposed that a China-joined adversary regarded as Earth Lusca is aggressively targeting community-experiencing servers by weaponizing N-day security flaws, including CVE-2021-22205, to infiltrate victim networks.

It is really highly advised that people update their GitLab installations to the latest version as before long as feasible to safeguard towards possible hazards.

Found this article exciting? Comply with us on Twitter  and LinkedIn to study more special material we submit.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «trend micro releases urgent fix for actively exploited critical security Trend Micro Releases Urgent Fix for Actively Exploited Critical Security Vulnerability
Next Post: Signal Messenger Introduces PQXDH Quantum-Resistant Encryption signal messenger introduces pqxdh quantum resistant encryption»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.