TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Critical Security Release for GitLab 8.2 through 8.7

95 点作者 iMerNibor大约 9 年前

4 条评论

beefhash大约 9 年前
Is it just me or has gitlab issued a lot of critical security releases lately?<p>I&#x27;m not sure if this is because they&#x27;re particularly open about these things or because their product might be particularly insecure.
评论 #11617684 未加载
评论 #11617759 未加载
评论 #11617769 未加载
评论 #11617693 未加载
评论 #11617863 未加载
评论 #11618178 未加载
评论 #11617915 未加载
评论 #11618300 未加载
dewiz大约 9 年前
Note for admins using Apache 2.4, regarding the manual quick fix described, take into consideration the Apache auth config changes described here <a href="https:&#x2F;&#x2F;httpd.apache.org&#x2F;docs&#x2F;current&#x2F;upgrading.html" rel="nofollow">https:&#x2F;&#x2F;httpd.apache.org&#x2F;docs&#x2F;current&#x2F;upgrading.html</a>
kentonv大约 9 年前
Gitlab can be run on Sandstorm.io (of which I am tech lead &#x2F; co-founder). Sandstorm claims to mitigate most vulnerabilities in apps:<p><a href="https:&#x2F;&#x2F;docs.sandstorm.io&#x2F;en&#x2F;latest&#x2F;using&#x2F;security-non-events&#x2F;" rel="nofollow">https:&#x2F;&#x2F;docs.sandstorm.io&#x2F;en&#x2F;latest&#x2F;using&#x2F;security-non-event...</a><p>Let&#x27;s see how it scores here...<p>For background, on Sandstorm, each Gitlab project is placed in a separate grain (container), isolated from all others. In order to communicate with a grain at all, you must have been granted some level of access to it by its owner -- Sandstorm does not let you send requests to private grains to which you haven&#x27;t been given access. So, private Gitlab repos hosted on Sandstorm are basically not vulnerable to any vulnerability.<p>Of course, Gitlab is the kind of thing you might intentionally make public to all, e.g. to host an open source project. Therefore, it makes sense to analyze whether a public repository would be exploitable.<p><pre><code> Privilege escalation via &quot;impersonate&quot; feature </code></pre> On Sandstorm, authentication is handled by Sandstorm. The app receives an unspoofable header indicating which user the request came from, and what permissions they have. A well-written app uses this header on every request to authenticate the user.<p>Unfortunately, our Gitlab package currently uses this information only when a session first opens, then relies on the session cookie going forward. This pattern is sometimes used as a &quot;hack&quot; on Sandstorm to more easily integrate with existing login code designed to do upfront &#x2F; one-time authentication. As such, public Gitlab repositories hosted on Sandstorm would be vulnerable.<p>Had Gitlab on Sandstorm been implemented &quot;properly&quot;, it would not be vulnerable. That said, the &quot;impersonate user&quot; feature would not have worked at all. That&#x27;s probably for the best: a feature like this really ought to be implemented by Sandstorm itself, which would have the ability to implement it (securely) across all apps at once, rather than have each app implement its own version.<p>Somewhat embarrassingly, the Sandstorm package of Gitlab actually predates this feature being added, therefore Gitlab instances on Sandstorm today actually aren&#x27;t vulnerable. (Generally, if the upstream app author does not directly maintain the Sandstorm package, then the Sandstorm package will tend to fall behind. This should get better as Sandstorm gains popularity and upstream authors target it explicitly.)<p><pre><code> Privilege escalation via notes API Privilege escalation via project webhook API Information disclosure via project labels Information disclosure via new merge request page </code></pre> These vulnerabilities allow a user to manipulate a private project to which they aren&#x27;t supposed to have access. On Sandstorm, a private project would live in its own grain, and if you hadn&#x27;t been given access then Sandstorm would deny you the ability to talk to the grain at all. Therefore, these cannot be exploited.<p><pre><code> XSS vulnerability via branch and tag names XSS vulnerability via custom issue tracker URL XSS vulnerability via label drop-down </code></pre> These vulnerabilities require that you have write access to one project on the server in order to launch an attack. On Sandstorm, since every repository is its own instance, the attack would be limited to the repository on which you have write access -- you would not be able to use this attack to damage someone else&#x27;s Gitlab repository on which you lack write access.<p><pre><code> XSS vulnerability via window.opener </code></pre> This is a subtle phishing issue that is very widespread. However, it mostly doesn&#x27;t work when the opener is a sandstorm app: the app lives inside an iframe which is prohibited by Content-Security-Policy from browsing away from the server.<p><pre><code> Information disclosure via milestone API Information disclosure via snippet API </code></pre> A public project hosted on Sandstorm would be vulnerable to these (leaking confidential issues attached to public milestones, and leaking private snippets attached to a public project). Sandstorm can only enforce access control at the grain level; anything finer than that is up to the app, and is subject to app bugs. I generally recommend that Sandstorm users try to put confidential data in separate grains from public data -- e.g. creating a separate issue tracker for confidential issues.<p>(The Sandstorm packaging again predates the milestone bug&#x27;s introduction, though may be affected by the snippet issue.)<p>We will update the Gitlab package tomorrow. Once an update is pushed, every Sandstorm user will receive a notification within 24 hours and can apply the update with one click.<p>Conclusion: Sandstorm mitigated 8&#x2F;11 issues by design, 2&#x2F;11 by accident, and is vulnerable to 1&#x2F;11. The biggest issue was only mitigated by accident in this case, although a well-behaved Sandstorm app normally wouldn&#x27;t have this kind of issue by design. Overall, though, I&#x27;m disappointed in Sandstorm&#x27;s performance here -- it&#x27;s much worse than the usual 95% mitigation rate.
评论 #11619009 未加载
评论 #11619035 未加载
评论 #11620280 未加载
评论 #11620253 未加载
评论 #11619089 未加载
gramakri大约 9 年前
Thanks for the release! We updated the cloudron.io app to use 8.7.1 we well. Cloudron users will get GitLab auto-updated tonight.