CVE-2024-11129
📋 TL;DR
This vulnerability in GitLab EE allows attackers to perform targeted searches with sensitive keywords to obtain counts of issues containing those terms. This information disclosure affects all GitLab EE versions from 17.1 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4.
💻 Affected Systems
- GitLab EE
📦 What is this software?
Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →⚠️ Risk & Real-World Impact
Worst Case
Attackers could enumerate sensitive issue counts to infer confidential project information, business activities, or security incidents, potentially leading to targeted attacks or intelligence gathering.
Likely Case
Attackers discover counts of issues containing sensitive terms, allowing them to infer project status, security incidents, or business activities without accessing actual issue content.
If Mitigated
With proper access controls and monitoring, impact is limited to statistical information disclosure rather than actual data exposure.
🎯 Exploit Status
Exploitation requires authenticated access and involves using search functionality with sensitive keywords.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 17.8.7, 17.9.6, 17.10.4
Vendor Advisory: https://gitlab.com/gitlab-org/gitlab/-/issues/503722
Restart Required: Yes
Instructions:
1. Backup your GitLab instance. 2. Update to GitLab EE 17.8.7, 17.9.6, or 17.10.4 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.
🔧 Temporary Workarounds
Restrict Search Permissions
allTemporarily restrict search functionality for non-admin users
# Configure via GitLab admin settings or application.yml
🧯 If You Can't Patch
- Implement strict access controls and monitor search activity logs
- Disable issue search functionality for non-essential users
🔍 How to Verify
Check if Vulnerable:
Check GitLab version via admin panel or command: sudo gitlab-rake gitlab:env:info
Check Version:
sudo gitlab-rake gitlab:env:info | grep 'GitLab version'
Verify Fix Applied:
Verify version is 17.8.7, 17.9.6, or 17.10.4 and test that sensitive keyword searches no longer return issue counts
📡 Detection & Monitoring
Log Indicators:
- Unusual search patterns with sensitive keywords
- High frequency of search requests from single users
Network Indicators:
- Increased API calls to search endpoints
SIEM Query:
source="gitlab" AND ("GET /api/v4/search" OR "POST /api/v4/search") AND ("password" OR "secret" OR "token" OR "key")