Skip to the content.

DIVD-2024-00002 - Account takeover vulnerability in Gitlab CE/EE

Our reference DIVD-2024-00002
Case lead Stan Plasmeijer
Author Ralph Horn
Researcher(s)
CVE(s)
Products
  • Gitlab Enterprise Edition
  • Gitlab Community Edition
Versions
  • 16.1 prior to 16.1.5
  • 16.2 prior to 16.2.8
  • 16.3 prior to 16.3.6
  • 16.4 prior to 16.4.4
  • 16.5 prior to 16.5.6
  • 16.6 prior to 16.6.4
  • 16.7 prior to 16.7.2
Recommendation Patch your Gitlab instance to the non vulnerable version
Patch status Released
Status Closed
Last modified 11 Jun 2024 17:39 CEST

Summary

An account takeover vulnerability via password reset without any user interactions was discovered in Gitlab CE/EE. This vulnerability is tracked as CVE-2023-7028 and can allow an attacker to take control over administrator accounts. Gitlab has released a patch to remediate the vulnerability. This vulnerability is currently exploited in the wild.

What you can do

Given that there is active exploitation, it is crucial to patch the system as soon as possible. Gitlab recommends patching the system and enabling Two-Factor Authentication (2FA) for all GitLab accounts.

What we are doing

DIVD is currently working to identify vulnerable instances and notify the owners of these systems. We do this by scanning for exposed Gitlab instances, and checking the version number to determine whether the vulnerability is present. Owners of vulnerable instances receive a notification with the host information and mitigation steps.

Timeline

Date Description
12 Jan 2024 DIVD receives signals about a vulnerability in Gitlab EE/CE and starts fingerprinting
13 Jan 2024 “DIVD starts scanning for vulnerable instances.”
13 Jan 2024 “Case opened, first version of this casefile.”
15 Jan 2024 “DIVD starts notifying customers with a vulnerable instance.”
07 May 2024 DIVD rescans the internet for vulnerable instances
07 May 2024 DIVD starts notifying network owners with a vulnerable instance for the second time
01 Jun 2024 DIVD rescans the internet for vulnerable instances
01 Jun 2024 DIVD starts notifying network owners with a vulnerable instance for the third time
01 Jun 2024 Case closed
gantt title DIVD-2024-00002 - Account takeover vulnerability in Gitlab CE/EE dateFormat YYYY-MM-DD axisFormat %e %b %Y section Case DIVD-2024-00002 - Account takeover vulnerability in Gitlab CE/EE (141 days) :2024-01-12, 2024-06-01 section Events DIVD receives signals about a vulnerability in Gitlab EE/CE and starts fingerprinting : milestone, 2024-01-12, 0d “DIVD starts scanning for vulnerable instances.” : milestone, 2024-01-13, 0d “Case opened, first version of this casefile.” : milestone, 2024-01-13, 0d “DIVD starts notifying customers with a vulnerable instance.” : milestone, 2024-01-15, 0d DIVD rescans the internet for vulnerable instances : milestone, 2024-05-07, 0d DIVD starts notifying network owners with a vulnerable instance for the second time : milestone, 2024-05-07, 0d DIVD rescans the internet for vulnerable instances : milestone, 2024-06-01, 0d DIVD starts notifying network owners with a vulnerable instance for the third time : milestone, 2024-06-01, 0d Case closed : milestone, 2024-06-01, 0d

More information