Connect with us

Tech News

GitLab Addressed Critical SAML Auth Flaw With Latest Release

Published

on

Latest Hacking News

A critical SAML authentication vulnerability has been discovered in GitLab, allowing malicious actors to bypass SAML authentication and gain unrestricted access. GitLab has promptly addressed this issue with the latest releases of both the Community Edition (CE) and Enterprise Edition (EE).

GitLab Addresses SAML Authentication Bypass Vulnerability

GitLab has recently released an advisory addressing a critical SAML authentication bypass vulnerability affecting self-managed installations.

GitLab utilizes the Security Assertion Markup Language (SAML) single sign-on (SSO) authentication protocol to ensure secure and authorized access to its instances. However, the vulnerability discovered made it possible for attackers to circumvent the authentication mechanisms and gain unauthorized access to GitLab instances.

Identified as CVE-2024-45409, the vulnerability specifically impacted the Ruby SAML library responsible for implementing client-side SAML authorization. The flaw allowed attackers to manipulate SAML responses by bypassing signature verification, enabling them to access target systems as any user.

The vulnerability affected Ruby SAML versions 12.2 through 1.13.0 and has been patched in versions 1.17.0 and 1.12.3. With a critical severity rating and a CVSS score of 10.0, the significance of this vulnerability cannot be understated.

GitLab confirms that only instances with SAML authentication enabled were affected by this vulnerability. The fix has been rolled out in GitLab CE and EE versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, and 16.11.10.

While GitLab advises users to update to the latest releases, they have also shared mitigation measures for those unable to update immediately. These measures include enabling two-factor authentication for all user accounts and disabling the SAML two-factor bypass option.

See also  The data, networking and GenAI driving The Open golf championship

Manual updates are required for self-managed GitLab instances, while GitLab Dedicated instances will receive automatic updates without user intervention.

In addition to this SAML vulnerability, GitLab has previously patched a significant XSS vulnerability in May, which could lead to account takeovers and other security risks.

We would love to hear your thoughts on this matter. Please share your comments below.

Trending