Zero-Click Takeover Alert – Thousands of Internet-Exposed GitLab Instances at High Risk

by | Jan 25, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

More than 5,300 GitLab instances exposed on the internet are grappling with a severe security vulnerability, CVE-2023-7028, which GitLab itself had issued a warning about earlier this month.

This critical flaw, carrying a CVSS score of 10.0, opens the door for attackers to execute a zero-click account takeover. The exploit allows threat actors to redirect password reset emails to an email address under their control, ultimately enabling them to change the account password and gain unauthorized access.

Despite not bypassing two-factor authentication (2FA), this vulnerability poses a significant risk to accounts lacking this additional layer of security. The affected versions include GitLab Community and Enterprise Editions ranging from 16.1 to 16.7, with fixes provided in the latest releases.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Despite GitLab’s response and the release of security updates on January 11, 2024, a recent report from ShadowServer indicates that 5,379 vulnerable GitLab instances remain exposed online. Given GitLab’s crucial role as a software development and project planning platform, the severity of the flaw puts these servers at risk of supply chain attacks, proprietary code exposure, API key leaks, and other malicious activities.

The majority of these vulnerable servers are identified in the United States, followed by Germany, Russia, China, France, the U.K., India, and Canada. GitLab emphasizes the urgency for administrators to follow the incident response guide, check for signs of compromise, and take immediate action.

Location of vulnerable GitLab instancesLocation of vulnerable GitLab instances (Shadowserver)




GitLab provides detection tips for defenders to identify potential compromises, encouraging them to check logs for specific HTTP requests and audit entries related to the vulnerability.

While there are no confirmed cases of active exploitation as of today, the urgency of the situation underscores the importance of swift action, including patching, credential rotation, 2FA implementation, and thorough security checks.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This