Security News > 2022 > June > GitLab security update fixes critical account take over flaw
![GitLab security update fixes critical account take over flaw](/static/build/img/news/gitlab-security-update-fixes-critical-account-take-over-flaw-medium.jpg)
GitLab has released a critical security update for multiple versions of its Community and Enterprise Edition products to address eight vulnerabilities, one of which allows account takeover.
Getting control over a GitLab account comes with severe consequences as hackers could gain access to developers' projects and steal source code.
Tracked as CVE-2022-1680 and rated with a critical severity score of of 9.9, the vulnerability affects all GitLab versions 11.10 through 14.9.4, 14.10 through 14.10.3, and version 15.0.
"When group SAML SSO is configured, the SCIM feature may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users' email addresses via SCIM to an attacker-controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account." - GitLab.
All GitLab users should move to the latest available versions as soon as possible.
The security updates contain fixes for two more high-severity flaws.
News URL
Related news
- ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws (source)
- Critical GitLab bug lets attackers run pipelines as any user (source)
- GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others (source)
- Juniper Networks Releases Critical Security Update for Routers (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-06 | CVE-2022-1680 | Unspecified vulnerability in Gitlab An account takeover issue has been discovered in GitLab EE affecting all versions starting from 11.10 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. | 6.5 |