A critical vulnerability in GitLab CE/EE can be easily exploited by attackers to reset GitLab user account passwords.
Users who have two-factor authentication enabled on their account are safe from account takeover.
“We have not detected any abuse of this vulnerability on platforms managed by GitLab, including GitLab.com and GitLab Dedicated instances. Self-managed customers can review their logs to check for possible attempts to exploit this vulnerability,” GitLab security engineer Greg Myers noted, and outlined what to look for.
CVE-2023-7028 was reported through the company’s bug bounty program and has been fixed in GitLab CE and EE versions 16.7.2, 16.6.4, 16.5.6.
GitLab advises admins of self-managed GitLab instances to upgrade to a patched version immediately, and to enable 2FA for all GitLab accounts.
CVE-2023-5356, a critical bug caused by incorrect authorization checks, which may allow a user to abuse Slack/Mattermost integrations to execute slash commands as another user.