[AbuseID:D73C11:19]: AbuseInfo: Account takeover vulnerability in Gitlab CE/EE — DIVD-2024-00002 — 116.202.173.223

 Hi,
 
 Researchers of DIVD have identified a vulnerable GitLab version inside your network. The identified version of GitLab is vulnerable to an account takeover. This allows a malicious party to perform a password reset and have the email delivered to an unverified email address.
 
 Scan data
 Scan time:2024-01-13T21:38:57.080268287+01:00
 Host: 116.202.173.223
 Port: 443
 Gitlab edition: gitlab-ee
 Possible GitLab version: 16.3.2 16.3.3 16.3.4
 
 It is possible that GitLab versions have two versions listed, this may be because the hash used is used in two versions. The versions displayed are both vulnerable.
 
 We have determined that you have a vulnerable version based on the «hash» in the manifest.json file. The hash in this file corresponds to certain versions and editions used by GitLab. We also checked whether username and/or email authentication is allowed, as this authentication mechanism is vulnerable to the account takeover vulnerability.
 
 DIVD case file:https://csirt.divd.nl/cases/DIVD-2024-00002
 GitLab Security Advisory:https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
 
 If you have any remaining questions or need help in mitigating this vulnerability, do not hesitate to contact us atcsirt@divd.nl.
 
 DIVD-CSIRT is part of DIVD, a non-profit organization that strives to make the Internet safer. More information about this institute can be found athttps://divd.nl.
 
 Thank you for your time and attention.
 
 DIVD-CSIRT
 
 P.S. If you are not running this server yourself but know the responsible party (e.g., because you are the ISP or hosting party), please forward this information to them. For this, you have our explicit approval.

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *