CVE-2024-3976

6.5 MEDIUM

📋 TL;DR

This vulnerability in GitLab allows unauthorized users to view confidential issue titles and descriptions from public projects via the user interface. It affects all GitLab Community Edition and Enterprise Edition instances running vulnerable versions. The issue enables information disclosure of sensitive project data.

💻 Affected Systems

Products:
  • GitLab Community Edition
  • GitLab Enterprise Edition
Versions: 14.0 to 16.9.6, 16.10 to 16.10.4, 16.11 to 16.11.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with vulnerable versions, regardless of configuration. Only affects public projects with confidential issues.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could access sensitive project information, intellectual property, security vulnerabilities, or confidential business plans from public projects, potentially leading to data breaches or competitive intelligence gathering.

🟠

Likely Case

Unauthorized users browsing public GitLab projects could inadvertently or intentionally view confidential issue details that should be restricted, leading to information disclosure.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to information disclosure from public projects only, with no system compromise or data modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the GitLab instance but no authentication. The vulnerability is in the UI and can be triggered by browsing public projects.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.9.7, 16.10.5, or 16.11.2

Vendor Advisory: https://about.gitlab.com/releases/2024/05/08/patch-release-gitlab-16-11-2-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab 16.9.7, 16.10.5, or 16.11.2 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Convert public projects to private

all

Temporarily convert affected public projects to private to prevent unauthorized access while waiting to patch.

Navigate to Project Settings > General > Visibility, project, feature, access > Change project visibility to Private

Disable public project access

all

Restrict public project access at instance level if feasible for your organization.

Admin Area > Settings > General > Visibility and access controls > Restrict visibility levels

🧯 If You Can't Patch

  • Monitor access logs for unusual patterns of public project browsing
  • Review and clean up confidential information from public project issues

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via Admin Area or command line. If version falls within affected ranges, the instance is vulnerable.

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'Version:'

Verify Fix Applied:

After updating, verify version is 16.9.7, 16.10.5, or 16.11.2 or higher. Test that confidential issues in public projects are no longer visible to unauthorized users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to public projects
  • Multiple failed authentication attempts followed by public project browsing

Network Indicators:

  • Increased traffic to public project issue pages from unauthenticated users

SIEM Query:

source="gitlab" AND (event="project_issues" OR event="issue_view") AND user="anonymous" AND project_visibility="public"

🔗 References

📤 Share & Export