GitLab patches critical vulnerability that allows hackers to take control of accounts

GitLab has just resolved a critical vulnerability that could allow hackers to take over users' accounts with hard-coded passwords. It is worth mentioning here that the hacker can perform the attack remotely.

This vulnerability was discovered by GitLab employees themselves and is tracked under the code CVE-2022-1162. It affects both GitLab Community Edition (CE) and Enterprise Edition (EE).

CVE-2022-1162 comes from an inadvertently set static password during OmniAuth-based registration in GitLab CE/EE.

GitLab patches critical vulnerability that allows hackers to take control of accounts Picture 1GitLab patches critical vulnerability that allows hackers to take control of accounts Picture 1

"Hard-coded passwords were set for accounts registered with OmniAuth providers (e.g. OAuth, LDAP, SAML) in GitLab CE/EE version 14.7 prior to 14.7.7, 14.8 prior to 14.8.5 and 14.9 before 14.9.2 allowed hackers to take control of the account," the GitLab team shared.

GitLab urges users to immediately upgrade all GitLab installations to the latest version (14.9.2, 14.8.5 or 14.7.7) to prevent the risk of being hacked.

As part of an effort to mitigate the damage of CVE-2022-1162, GitLab said it has reset the passwords of some GitLab.com users. In addition, a recently submitted commit revealed that GitLab removed the file "lib/gitlab/password.rb" that was used to attach a weakly hard-coded password to the row number "TEST_DEFAULT".

GitLab patches critical vulnerability that allows hackers to take control of accounts Picture 2GitLab patches critical vulnerability that allows hackers to take control of accounts Picture 2

GitLab says it has not seen any evidence of user accounts being compromised by hackers by exploiting this vulnerability. Even so, GitLab still creates a script that administrators can use to identify user accounts potentially affected by CVE-2022-1162. Details about the vulnerability and how to download the script can be found here.

Once a potentially affected user account is identified, an administrator should reset the user's password.

More than 100,000 organizations use GitLab's DevOps platform, and an estimated 30 million users from 66 countries are registered with the platform.

4 ★ | 1 Vote