CVE-2024-0402
Gitlab
CVE-2024-0402 allows authenticated users to write files to arbitrary locations on a GitLab server, potentially leading to remote code execution. This vulnerability affects GitLab CE/EE versions 16.0 before 16.6.6, 16.7 before 16.7.4, and 16.8 before 16.8.1. With a SOCRadar Vulnerability Risk Score (SVRS) of 94, this is a critical vulnerability that demands immediate attention and patching. Successful exploitation could enable attackers to gain control of the GitLab server and compromise sensitive data. Given the availability of active exploits, organizations using affected GitLab versions are at high risk. This issue is significant due to its potential for widespread impact and ease of exploitation. The vulnerability is classified as CWE-22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').
Description:
CVE-2024-0402 is a critical vulnerability in GitLab CE/EE versions 16.0 to 16.6.6, 16.7 to 16.7.4, and 16.8 to 16.8.1. It allows an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace. This vulnerability has a CVSS score of 9.9, indicating its severe impact on confidentiality, integrity, and availability. However, the SOCRadar Vulnerability Risk Score (SVRS) of 34 suggests that the vulnerability is not as critical as the CVSS score indicates.
Key Insights:
- Exploitation: Active exploits for CVE-2024-0402 have been published, making it a high-priority target for attackers.
- Threat Actors: Threat actors and APT groups are actively exploiting this vulnerability to gain unauthorized access to GitLab servers and compromise sensitive data.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about CVE-2024-0402, urging organizations to take immediate action to patch their systems.
- In the Wild: The vulnerability is actively exploited by hackers in the wild, making it a significant threat to organizations using GitLab.
Mitigation Strategies:
- Update GitLab: Organizations should immediately update their GitLab instances to the latest version (16.6.6, 16.7.4, or 16.8.1) to mitigate the vulnerability.
- Restrict Access: Implement strict access controls to limit the number of users who can create workspaces and write files to the GitLab server.
- Enable Two-Factor Authentication: Enforce two-factor authentication for all GitLab users to add an extra layer of security.
- Monitor for Suspicious Activity: Continuously monitor GitLab logs and activity for any suspicious behavior that may indicate an attack.
Additional Information:
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.