GitLab users are being urged to update their servers immediately to protect against a critical flaw that could potentially be exploited by threat actors. The flaw, known as CVE-2023-5009, is related to scheduled security scan policies and could allow threat actors to run pipelines as other users, compromising private repositories. This flaw is actually a bypass of another bug, CVE-2023-3932, that was identified and addressed in July.
Given the severity of the vulnerability, GitLab is strongly recommending that all installations running an affected version should be upgraded to the latest version as soon as possible. The company has emphasized the importance of taking action to defend against this flaw.
According to Alex Ilgayev, the Head of Security Research at Cycode, any user could potentially exploit this critical flaw by using the “got config” command to change the policy file author. Ilgayev explained that this vulnerability is a bypass to a previously patched vulnerability that allowed threat actors to forge the identity of the policy file committer. By hijacking the pipeline permissions, attackers were able to gain access to any user’s private repositories. While GitLab has not provided official details about the bypass, Ilgayev discovered that it involves removing the bot user from the group, allowing the execution of the previous vulnerability flow again.
It is crucial for GitLab users to be aware of this vulnerability and take immediate action to update their servers. Failure to do so could leave their pipelines at risk and potentially expose sensitive information within private repositories. Threat actors are constantly seeking out these types of vulnerabilities to exploit and compromise systems, so staying ahead of them by implementing the necessary security measures is vital.
By promptly updating and patching their servers, GitLab users can effectively mitigate the risks associated with this critical flaw. It is also recommended for users to monitor their pipelines and repositories closely for any signs of unauthorized access or activity. Implementing additional security measures, such as multi-factor authentication and access controls, can further enhance the protection of GitLab deployments.
This incident serves as a reminder of the ongoing challenges organizations face in maintaining the security of their software and systems. Developers and security teams must remain vigilant in identifying and addressing vulnerabilities promptly. Regular vulnerability assessments, as well as staying informed about the latest security updates and patches, are crucial components of a comprehensive security strategy.
GitLab has been actively working to enhance its platform’s security and governance features. In recent releases, the company has introduced software supply chain enhancements and added governance software. These efforts are aimed at helping organizations strengthen the security posture of their GitLab deployments and ensure the integrity and confidentiality of their code and repositories.
In conclusion, the discovery of the critical flaw in GitLab’s scheduled security scan policies highlights the importance of promptly updating servers and addressing vulnerabilities. Taking immediate action to update to the latest version of GitLab is crucial to protect against potential threats and prevent compromise of private repositories. By staying informed about security updates and implementing additional security measures, organizations can enhance the security of their GitLab deployments and mitigate the risks associated with evolving threat landscapes.

