CVE-2024-5067
📋 TL;DR
This vulnerability allows group members with Developer or higher roles to access project-level analytics settings that should be restricted. It affects GitLab EE installations running vulnerable versions, potentially exposing sensitive configuration data to unauthorized internal users.
💻 Affected Systems
- GitLab EE
📦 What is this software?
Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →Gitlab by Gitlab
GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...
Learn more about Gitlab →⚠️ Risk & Real-World Impact
Worst Case
Sensitive project analytics settings containing confidential business metrics or operational data are exposed to unauthorized group members, potentially enabling further attacks or data exfiltration.
Likely Case
Internal users with Developer+ roles inadvertently access analytics settings they shouldn't see, potentially learning about project metrics, usage patterns, or configuration details they're not authorized to view.
If Mitigated
With proper access controls and monitoring, impact is limited to information disclosure within already-trusted internal users who have some level of legitimate access to the group.
🎯 Exploit Status
Exploitation requires authenticated access as a group member with Developer role or higher. The vulnerability involves DOM data leakage that can be accessed through normal web interface interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 17.0.5, 17.1.3, or 17.2.1
Vendor Advisory: https://gitlab.com/gitlab-org/gitlab/-/issues/458504
Restart Required: Yes
Instructions:
1. Backup your GitLab instance. 2. Update GitLab EE to version 17.0.5, 17.1.3, or 17.2.1 depending on your current version track. 3. Restart GitLab services. 4. Verify the update was successful.
🔧 Temporary Workarounds
Restrict Developer Role Access
allTemporarily reduce Developer role permissions or limit group membership while awaiting patch
🧯 If You Can't Patch
- Implement strict access controls and monitor group member activities
- Consider temporarily limiting analytics feature usage in vulnerable versions
🔍 How to Verify
Check if Vulnerable:
Check GitLab version via Admin Area or run: sudo gitlab-rake gitlab:env:info | grep 'Version:'
Check Version:
sudo gitlab-rake gitlab:env:info | grep 'Version:'
Verify Fix Applied:
Confirm version is 17.0.5+, 17.1.3+, or 17.2.1+ and test that Developer role users cannot access restricted analytics settings
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to analytics endpoints by Developer role users
- Multiple failed authorization attempts for analytics resources
Network Indicators:
- Increased requests to /groups/*/analytics endpoints from Developer role accounts
SIEM Query:
source="gitlab" AND (uri_path="/analytics" OR uri_path="/groups/*/analytics") AND user_role="Developer"
🔗 References
- https://gitlab.com/gitlab-org/gitlab/-/issues/458504
- https://gitlab.com/gitlab-org/gitlab/-/issues/462427
- https://hackerone.com/reports/2462303
- https://hackerone.com/reports/2502047
- https://gitlab.com/gitlab-org/gitlab/-/issues/458504
- https://gitlab.com/gitlab-org/gitlab/-/issues/462427
- https://hackerone.com/reports/2462303
- https://hackerone.com/reports/2502047