Hi,
Researchers of DIVD have identified a vulnerable GitLab version inside your network. The identified version of GitLab is vulnerable to an account takeover. This allows a malicious party to perform a password reset and have the email delivered to an unverified email address.
Scan data
Scan time:2024-01-13T21:38:57.080268287+01:00
Host: 116.202.173.223
Port: 443
Gitlab edition: gitlab-ee
Possible GitLab version: 16.3.2 16.3.3 16.3.4
It is possible that GitLab versions have two versions listed, this may be because the hash used is used in two versions. The versions displayed are both vulnerable.
We have determined that you have a vulnerable version based on the «hash» in the manifest.json file. The hash in this file corresponds to certain versions and editions used by GitLab. We also checked whether username and/or email authentication is allowed, as this authentication mechanism is vulnerable to the account takeover vulnerability.
DIVD case file:https://csirt.divd.nl/cases/DIVD-2024-00002
GitLab Security Advisory:https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
If you have any remaining questions or need help in mitigating this vulnerability, do not hesitate to contact us atcsirt@divd.nl.
DIVD-CSIRT is part of DIVD, a non-profit organization that strives to make the Internet safer. More information about this institute can be found athttps://divd.nl.
Thank you for your time and attention.
DIVD-CSIRT
P.S. If you are not running this server yourself but know the responsible party (e.g., because you are the ISP or hosting party), please forward this information to them. For this, you have our explicit approval.