CVE-2024-9183

7.7 HIGH

📋 TL;DR

This vulnerability in GitLab allows authenticated users to steal credentials from higher-privileged users and impersonate them under specific conditions. It affects GitLab Community Edition and Enterprise Edition installations running vulnerable versions. Attackers could gain unauthorized access to sensitive data and perform privileged actions.

💻 Affected Systems

Products:
  • GitLab Community Edition
  • GitLab Enterprise Edition
Versions: 18.4.0 to 18.4.4, 18.5.0 to 18.5.2, 18.6.0
Operating Systems: All platforms running GitLab
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments regardless of configuration. Requires authenticated user access.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges, accesses all repositories, steals source code, modifies CI/CD pipelines, and compromises the entire GitLab instance.

🟠

Likely Case

Attackers steal credentials from project maintainers or administrators to access private repositories, modify code, or exfiltrate sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to credential theft detection and revocation before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and specific conditions. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 18.4.5, 18.5.3, or 18.6.1

Vendor Advisory: https://about.gitlab.com/releases/2025/11/26/patch-release-gitlab-18-6-1-released/

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab 18.4.5, 18.5.3, or 18.6.1 depending on your current version. 3. Restart GitLab services. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user permissions to minimum required access

🧯 If You Can't Patch

  • Implement strict access controls and principle of least privilege
  • Enable detailed audit logging and monitor for suspicious credential usage

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via admin interface or run: sudo gitlab-rake gitlab:env:info | grep 'GitLab version'

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab version'

Verify Fix Applied:

Confirm version is 18.4.5, 18.5.3, or 18.6.1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Privilege escalation attempts
  • Access from unexpected user contexts

Network Indicators:

  • Unusual API call sequences
  • Multiple credential validation requests

SIEM Query:

source="gitlab" AND (event_type="authentication" OR event_type="authorization") AND status="success" | stats count by user, ip_address | where count > threshold

🔗 References

📤 Share & Export