Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3627 GitLab Critical Security Release: 11.5.0-rc12, 11.4.6, 11.3.10 21 November 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: GitLab Publisher: GitLab Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Create Arbitrary Files -- Existing Account Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-19359 CVE-2018-18643 Original Bulletin: https://about.gitlab.com/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/ - --------------------------BEGIN INCLUDED TEXT-------------------- GitLab Critical Security Release: 11.5.0-rc12, 11.4.6, 11.3.10 Today we are releasing versions 11.5.0-rc12, 11.4.6, and 11.3.10 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. The vulnerability details will be made public on our issue tracker in approximately 30 days. Please read on for more information regarding this release. Persistent XSS Autocompletion An attribute used in autocompletion contained an input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned CVE-2018-18643. Versions Affected Affects GitLab CE 11.2 and later. Remediation We strongly recommend that all installations running an affected version above to be upgraded to the latest version as soon as possible. Unauthorized service template creation The project import feature contained an input validation issue that resulted in the ability for an unauthorized user to create service templates. The issue is now mitigated in the latest release and is assigned CVE-2018-19359. Thanks to @jobert for responsibly reporting this vulnerability to us. Versions Affected Affects GitLab CE 8.9 and later. Remediation We strongly recommend that all installations running an affected version above to be upgraded to the latest version as soon as possible. Updating To update, check out our update page. Updated: 2018-11-20: We have received some questions regarding the XSS vulnerability in this release and a similar vulnerability reported in October. The fix in this release does correct an incomplete patch in the October security release. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW/T+JGaOgq3Tt24GAQgjEBAAwI/2uW0KIAY/eZHsb0tLZ9szLB+8nQWp ugwWcwUxwgkgNnHYddCynsDYT+3alEuWlZ8hVyx6u+DQ7+6/atjd9eLtx6nO7Lw/ S01JVfmj636lWa+RVj+yEIBsmQxvodRj7PvQEdeZ5d9efcpXjvSVBAYdT/kX+fL4 RsqOgQF+bbPOjgKy1RWuO8KMF+apko0J+lh8CFqkufusYTeOxCUU3YAV3f0F64Px 4zmeXdg576IMpWe0kRdUNCqK1jNHvCk8yA/tEmYFWTRbuQOD4yBcWkkc/NAxPXU2 A19vVD7392+488HtrFbt8wVhcE0qMcNrG19pkxENEmj7dtYASEoqAFImv+dT2PEb dPM9EgW8kbiyMjYeZUXPeCuPmXqDTsBvI1HBwRAdUu0egGwjWpa5n7kN4tvXlzdt BmnJqwYN9ZoD98O6lrk6UgLrQGt7SUIB8gvmQBsBdBxl0VmZqFYIMcztx58gYFvA O7awgLLuLnuxZdTdNTlcErhv+n83IQn7rxfzQA/S4I07j1rxf/XB0NPWLXA7fqFe 40UF00Guc6OUdIFux1hAmKYNcK+Ufoqq2zEP8kzHbk3bVwgJslLvRNuc+BQExqag frlPf114wbBnrdgoBWQlIEcICIT5Ya8AhBWeATmHTBQ7YkL2rwQQUa4BMJ39fqxR czEGRvCvHLM= =tGQM -----END PGP SIGNATURE-----