Lucene search

K
malwarebytesChristopher BoydMALWAREBYTES:39CA5972641E3FA5EDB4F967DD97AFC9
HistoryApr 05, 2022 - 8:56 a.m.

GitLab issues security updates; watch out for hard coded passwords

2022-04-0508:56:14
Christopher Boyd
blog.malwarebytes.com
16

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

GitLab has issued several critical security updates, with users of the version control software urged to upgrade their installations as soon as possible. One of the fixes is for a hard coded password issue.

What is distributed version control?

Distributed version control is a way for an organisationā€™s codebase to be mirrored on the devices of anyone who needs access. Where people occasionally become confused is when they see a number of services using the word ā€œGitā€ in their name. They're not all the same thing, and we shouldn't unnecessarily worry that one issue affects lots of different services due to naming conventions.

Are GitHub and GitLab the same thing?

They are not! If youā€™re reading about this update, youā€™re reading about an update for users of GitLab specifically. GitHub isnā€™t affected by this, and so users shouldnā€™t worry about missing security updates for hard-coded passwords. Hub and Lab are similar, but most definitely not the same.

Whatā€™s happened with GitLab?

Thereā€™s been a critical security release, addressing multiple issues. No fewer than 17 elements have been addressed, with one rated critical, two rated high, and nine rated medium. Hereā€™s the rundown of the issue rated critical from their release page:

> Static passwords inadvertently set during OmniAuth-based registration
>
> A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts. This is a critical severity issue (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, 9.1). It is now mitigated in the latest release and is assigned CVE-2022-1162.
>
> This vulnerability has been discovered internally by the GitLab team.
>
> Note: We executed a reset of GitLab.com passwords for a selected set of users as of 15:38 UTC. Our investigation shows no indication that users or accounts have been compromised but weā€™re taking precautionary measures for our usersā€™ security.

What are hardcoded passwords, and why are they bad?

Hardcoded passwords, also known as embedded credentials, make using the software or device theyā€™re attached to a risky business. If your cheap, off the shelf router has the same single password in use for every single device, thatā€™s bad. Someone who owns one of these devices now knows the password for all of those devices. If your forum software has a single, unchangeable password buried in the code, thatā€™s bad. Somebody with dubious intentions may well have the keys to the kingdom for all versions of that forum.

Itā€™s a similar story here - with a few caveats. According to The Register, accounts created through OmniAuth using fewer than 21 characters for the password were vulnerable to the default password. A script has also been released which, in GitLabā€™s words, ā€œā€¦can be used by self-managed instance admins to identify user accounts potentially impacted by CVE-2022-1162ā€.

Time to update

If you think you may be impacted by this, make haste and check out the list of updates. You donā€™t want to leave an easy way in for attackers to exploit your business.

The post GitLab issues security updates; watch out for hard coded passwords appeared first on Malwarebytes Labs.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P