CVE-2024-4612

6.4 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in GitLab EE that could allow attackers to hijack OAuth flows and potentially take over user accounts. The vulnerability affects GitLab EE versions 12.9 through 17.3.1 under specific conditions. Attackers could redirect users to malicious sites during authentication, compromising account security.

💻 Affected Systems

Products:
  • GitLab EE
Versions: 12.9 to 17.1.6, 17.2 to 17.2.4, 17.3 to 17.3.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitLab EE (Enterprise Edition), not CE (Community Edition). Requires specific conditions to trigger the open redirect during OAuth flow.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful account takeover of GitLab users, potentially including administrators, leading to data theft, code repository compromise, and lateral movement within the organization.

🟠

Likely Case

Targeted phishing attacks against GitLab users, credential theft, and potential access to sensitive repositories and CI/CD pipelines.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and user awareness training about phishing risks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (clicking a malicious link) and specific conditions during OAuth authentication flow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.1.7, 17.2.5, or 17.3.2

Vendor Advisory: https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab EE version 17.1.7, 17.2.5, or 17.3.2 depending on your current version. 3. Restart GitLab services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable OAuth integrations

all

Temporarily disable OAuth provider integrations to prevent exploitation of the vulnerability.

Edit GitLab configuration to remove OAuth providers

Network segmentation

all

Restrict access to GitLab instance to trusted networks only.

Configure firewall rules to limit GitLab access

🧯 If You Can't Patch

  • Implement strict network access controls to limit GitLab exposure
  • Enable multi-factor authentication for all GitLab users

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via admin interface or command line. If version is between 12.9-17.1.6, 17.2-17.2.4, or 17.3-17.3.1, you are vulnerable.

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab Version'

Verify Fix Applied:

Verify GitLab version is 17.1.7, 17.2.5, or 17.3.2 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual OAuth redirect patterns
  • Failed authentication attempts with suspicious redirect URLs
  • Multiple authentication requests from single IP

Network Indicators:

  • HTTP 302 redirects to unexpected domains during OAuth flow
  • Traffic patterns showing authentication flow interruptions

SIEM Query:

source="gitlab" AND (event="oauth_redirect" OR event="authentication_failure") AND url CONTAINS "redirect_uri="

🔗 References

📤 Share & Export