PTA Warns Against Serious Security Flaws in GitLab – Urgent Update for Developers

PTA Warns Against Serious Security Flaws in GitLab – Urgent Update for Developers

The Pakistan Telecommunication Authority (PTA) has issued a cybersecurity advisory highlighting multiple high-risk vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE)43dcd9a7-70db-4a1f-b0ae-981daa162054. These flaws, affecting versions from 8.0 up to those released before 17.4.2, pose a significant threat to information security.

Two major vulnerabilities, CVE-2023-3441 and CVE-2024-5005, have been identified:

  • CVE-2023-3441: Insufficient security warnings when users are granted merge rights to protected branches, increasing the risk of unauthorized changes in critical project code.
  • CVE-2024-5005: Allows remote authenticated attackers to exploit GitLab’s API, potentially exposing sensitive project information such as templates.

Cybersecurity experts warn that these vulnerabilities could be exploited to compromise organizational data, especially in environments relying on GitLab for software development and version control. Attackers may gain unauthorized access to protected project data, putting intellectual property and sensitive operations at risk.

PTA’s Recommendations:
The PTA strongly advises all GitLab users to upgrade immediately to the latest versions available on GitLab’s official website. Patches addressing these vulnerabilities were released on October 9, 2024, including version 17.4.2, which resolves both CVEs.

Organizations using GitLab should:

  • Review their current installations.
  • Apply the recommended security updates.
  • Adopt proactive cybersecurity practices to prevent exploitation.