
=====================================================================

                                 CERT-Renater

                      Note d'Information No. 2022/VULN274

_____________________________________________________________________

DATE                : 23/08/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running GitLab versions prior to
                          15.3.1, 15.2.3, 15.1.5.

=====================================================================
https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/
_____________________________________________________________________

Aug 22, 2022 - Nick Malcolm
GitLab Critical Security Release: 15.3.1, 15.2.3, 15.1.5


Learn more about GitLab Critical Security Release: 15.3.1, 15.2.3,
15.1.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).

Today we are releasing versions 15.3.1, 15.2.3, 15.1.5 for GitLab
Community Edition (CE) and Enterprise Edition (EE).

These versions contain important security fixes, and we strongly
recommend that all GitLab installations be upgraded to one of
these versions immediately. GitLab.com is already running the
patched version.

GitLab releases patches for vulnerabilities in dedicated security
releases. There are two types of security releases: a monthly,
scheduled security release, released a week after the feature
release (which deploys on the 22nd of each month), and ad-hoc
security releases for critical vulnerabilities. For more
information, you can visit our security FAQ. You can see all
of our regular and security release blog posts here. In addition,
the issues detailing each vulnerability are made public on our
issue tracker 30 days after the release in which they were
patched.

We are dedicated to ensuring all aspects of GitLab that are
exposed to customers or that host customer data are held to the
highest security standards. As part of maintaining good security
hygiene, it is highly recommended that all customers upgrade to
the latest security release for their supported version. You
can read more best practices in securing your GitLab instance
in our blog post.


Recommended Action

We strongly recommend that all installations running a version
affected by the issues described below are upgraded to the latest
version as soon as possible.

When no specific deployment type (omnibus, source code, helm
chart, etc.) of a product is mentioned, this means all types
are affected.


Table of Fixes

Title                                           Severity
Remote Command Execution via Github import      Critical
Remote Command Execution via Github import

A vulnerability in GitLab CE/EE affecting all versions starting
from 11.3.4 before 15.1.5, all versions starting from 15.2
before 15.2.3, all versions starting from 15.3 before 15.3.1
allows an an authenticated user to achieve remote code execution
via the Import from GitHub API endpoint. This is a Critical
severity issue (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, 9.9).
It is now mitigated in the latest release and is assigned
CVE-2022-2884.


Thanks yvvdwf for reporting this vulnerability through our
HackerOne bug bounty program.


Workarounds

If you're unable to upgrade right away, you can secure your
GitLab installation against this vulnerability using the
workaround outlined below until you have time to upgrade.


Disable GitHub import

Login using an administrator account to your GitLab
installation and perform the following:

     Click "Menu" -> "Admin".
     Click "Settings" -> "General".
     Expand the "Visibility and access controls" tab.
     Under "Import sources" disable the "GitHub" option.
     Click "Save changes".

Verifying the workaround

     In a browser window, login as any user.
     Click "+" on the top bar.
     Click "New project/repository".
     Click "Import project".
     Verify that "GitHub" does not appear as an import option.


Updating

To update GitLab, see the Update page. To update Gitlab Runner,
see the Updating the Runner page.


Receive Security Release Notifications

To receive security release blog notifications delivered to
your inbox, visit our contact us page. To receive release
notifications via RSS, subscribe to our security release
RSS feed or our RSS feed for all releases.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================


