Category: IT|Mar 13, 2025 | Author: Admin

GitLab patches critical authentication bypass vulnerabilities

Share on

GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), fixing nine vulnerabilities, among which two critical severity ruby-saml library authentication bypass flaws.

GitLab patches critical authentication bypass vulnerabilities

All flaws were addressed in GitLab CE/EE versions 17.7.7, 17.8.5, and 17.9.2, while all versions before those are vulnerable.

 

GitLab.com is already patched, and GitLab Dedicated customers will be updated automatically, but users who maintain self-managed installations on their own infrastructure will need to apply the updates manually.

 

"We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible," warns the bulletin.

 

The two critical flaws GitLab addressed this time are CVE-2025-25291 and CVE-2025-25292, both in the ruby-saml library, which is used for SAML Single Sign-On (SSO) authentication at the instance or group level.

 

These vulnerabilities allow an authenticated attacker with access to a valid signed SAML document to impersonate another user within the same SAML Identity Provider (IdP) environment.

 

This means an attacker could gain unauthorized access to another user's account, leading to potential data breaches, privilege escalation, and other security risks.

 

GitHub discovered the ruby-saml bugs and has published a technical deep dive into the two flaws, noting that its platform hasn't been impacted as the use of the ruby-saml library stopped in 2014.

 

"GitHub doesn't currently use ruby-saml for authentication, but began evaluating the use of the library with the intention of using an open source library for SAML authentication once more," explains GitHub's writeup.

 

"This library is, however, used in other popular projects and products. We discovered an exploitable instance of this vulnerability in GitLab, and have notified their security team so they can take necessary actions to protect their users against potential attacks."

 

Of the rest of the issues fixed by GitLab, one that stands out is a high-severity remote code execution issue tracked under CVE-2025-27407.

 

The flaw allows an attacker-controlled authenticated user to exploit the Direct Transfer feature, which is disabled by default, to achieve remote code execution.

 

The remaining issues are low to medium-severity problems concerning the denial of service (DoS), credential exposure, and shell code injection, all exploitable with elevated privileges.

 

GitLab users who cannot upgrade immediately to a safe version are advised to apply the following mitigations in the meantime:

 

  • Ensure all users on the GitLab self-managed instance have 2FA enabled. Note that MFA at the identity provider level does not mitigate the problem.

  • Disable the SAML two-factor bypass option.

  • Request admin approval for auto-created users by setting 'gitlab_rails['omniauth_block_auto_created_users'] = true'

 

While these steps significantly reduce the risk of exploitation, they should only be treated as temporary mitigation measures until upgrading to GitLab 17.9.2, 17.8.5, or 17.7.7 is practically possible.

To update GitLab, head to the official downloads hub. GitLab Runner installation instructions are available here.

Sponsored Ads:

Comments:


Microsoft-365-headpic-24-04-25.png

Microsoft blocks ActiveX by default in Microsoft 365, Office 2024

Category: Microsoft|Apr 24, 2025 | Author: Admin
logo.png

Microsoft Exchange 2016 and 2019 reach end of support in six months

Category: Microsoft|Apr 23, 2025 | Author: Admin
android-22-04-25.png

Google adds Android auto-reboot to block forensic data extractions

Category: Google|Apr 22, 2025 | Author: Admin
Outlook-21-04-25.png

Microsoft warns of CPU spikes when typing in classic Outlook

Category: Microsoft|Apr 21, 2025 | Author: Admin
hertz-sign-20-04-25.png

Hertz confirms customer info, drivers' licenses stolen in data breach

Category: General|Apr 20, 2025 | Author: Admin
hacker-19-04-25.png

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals

Category: IT|Apr 19, 2025 | Author: Admin
padlock-18-04-25.png

SSL/TLS certificate lifespans reduced to 47 days by 2029

Category: IT|Apr 18, 2025 | Author: Admin
RAT-17-04-25.png

New ResolverRAT malware targets pharma and healthcare orgs worldwide

Category: IT|Apr 17, 2025 | Author: Admin
DaVita-sign-16-04-25.png

Kidney dialysis firm DaVita hit by weekend ransomware attack

Category: General|Apr 16, 2025 | Author: Admin
Exchange_headpic-15-04-25.png

Microsoft Exchange 2016 and 2019 reach end of support in six months

Category: Microsoft|Apr 15, 2025 | Author: Admin
Meta-14-04-25.png

Meta to resume AI training on content shared by Europeans

Category: IT|Apr 14, 2025 | Author: Admin
ChatGPT-headpic-13-04-25.png

Leak confirms OpenAI's GPT 4.1 is coming before GPT 5.0

Category: IT|Apr 13, 2025 | Author: Admin
microsoft-365-malicious-email-12-04-15.png

Tycoon2FA phishing kit targets Microsoft 365 with new tricks

Category: Microsoft|Apr 12, 2025 | Author: Admin
Google_flare-11-04-25.png

Google's AI video generator Veo 2 is rolling out on AI Studio

Category: Google|Apr 11, 2025 | Author: Admin
ChatGPT-10-04-25.png

OpenAI wants ChatGPT to know you over your life with new Memory update

Category: IT|Apr 10, 2025 | Author: Admin
more