Critical SAML Authentication Bypass vulnerability in Gitlab CE and EE Editions
Date of Publish: 19th.Sept,2024
Severity: Critical
Affected System
- Gitlab Community Edition (CE)
- Gitlab Enterprise Edition (EE)
Summary
An authentication bypass critical vulnerability is reporting in Community Edition (CE) and Enterprise Edition (EE) that may result in login in to the affected system
Description
This vulnerability is reported in the ruby-saml library which could allow an attacker to log in as an arbitrary user in the affected system. The problem as a result of the library not properly verifying the signature of the SAML Response. An unauthenticated attacker with access to any signed SAML document (by the IdP) can force a SAML Response/Assertion with arbitrary code and take control of the compromised system.
Recommendation
Apply below fix upgrade
https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-released/
- update the dependencies omniauth-saml to version 2.2.1 and ruby-saml to 1.17.0. This includes versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, and 16.11.10
CVE Name:
CVE-2024-45409
NOTE: The information is provide is on “as is “ basis, without assurance of any kind .
Revision history
-
19-Sept-24 – first advisory released. — fix patch released
