Gitlab 密码重置漏洞导致超过 5300 台服务器可供抢夺
Gitlab password reset bug leaves more than 5.3K servers up for grabs

原始链接: https://www.scmagazine.com/news/gitlab-password-reset-bug-leaves-more-than-5-3k-servers-up-for-grabs

1月初,流行的开源软件开发工具GitLab发现了一个名为CVE-2023-7028的严重漏洞,由于其登录系统存在缺陷,该漏洞允许远程接管软件开发人员帐户。 尽管发布了补丁,但截至 1 月底,全球超过 5,300 台 GitLab 服务器仍未受到该问题的保护,因此很容易受到潜在的黑客攻击。 测试该问题的研究人员报告说,该问题非常有效且易于利用。 为了保护自己,GitLab 建议拥有自托管实例的用户检查其日志,以查找与特定路径的 HTTP 请求相关的可疑活动。 从那时起,根据 Shadowserver 基金会提供的最新统计,在一月中旬发现的服务器中,只有不到一半的服务器似乎仍然容易受到该漏洞的影响。 该基金会敦促所有受影响的各方立即更新其系统,同时保持启用双因素身份验证,以防止进一步的访问问题。 By addressing these concerns and implementing best practices such as updating regularly, adding a second layer of protection through two-factor authentication, and strengthening login procedures, organizations can better protect their confidential information stored within GitLab's infrastructure. 根据以上文字材料,生成以下100字摘要: 在发现影响 GitLab 登录系统的重大漏洞(称为 CVE-2023-7028)后,该公司采取了各种措施来解决此问题。 不幸的是,尽管及时提供了 16.5.6、16.6.4 和 16.7.2 等版本的补丁,但大约 5,300 台 GitLab 服务器继续运行,原始缺陷在 1 月底仍然存在。 正如一些评估其功效的研究人员所揭示的那样,这一弱点被证明非常有效且相对简单,一旦成功利用,就会促进潜在的帐户接管。 为了减轻与此漏洞相关的风险,GitLab 建议验证日志记录,以追踪与指向指定 URL 路径的 HTTP 请求相关的异常行为。 在二月初发布了一份初步报告,详细说明了受威胁服务器数量几乎是原来的两倍之后,受感染服务器的数量随后在一个月内下降到之前提到的数字的大约三分之一。 同时,专家建议更新并激活多因素识别,以最大限度地提高安全措施

然而,采用魔术链接和密钥等替代方案可以大大增强应用程序的整体安全性。 虽然采用速度似乎很慢,但正在取得进展,技术进步正在增加本地实现此类功能的可行性。 尽管如此,对于开发人员和应用程序所有者来说,继续探索新选项并寻找减轻潜在风险的方法非常重要,以便为用户创建更安全的环境。 基于硬件的身份验证提供了针对密码泄露的额外保护层,因为它允许用户使用智能卡或 USB 密钥等物理令牌来对自己进行身份验证,而不是仅仅依赖密码。 最终,创建安全系统需要在安全措施的易用性和稳健性之间取得平衡。
相关文章

原文

Critical GitLab vulnerability CVE-2023-7028 was not patched on more than 5,300 servers as of Tuesday, potentially enabling remote takeover of software developers’ accounts.

The bug, with a maximum CVSS score of 10, was first disclosed and patched by GitLab on Jan. 11. The vulnerability in GitLab’s login system would allow an attacker to have a password reset link sent to their own unverified email address without any user interaction by the victim.

“Account takeover can be achieved by crafting a specially formatted HTTP request that is capable of sending a password reset email to an unverified email address in an unpatched version,” a GitLab spokesperson told SC Media in a Jan. 12 email.

Security updates were released for GitLab versions 16.5.6, 16.6.4 and 16.7.2 and backported to versions 16.1.6, 16.2.9, 16.3.7 and 16.4.5, as well.

One researcher who tested the bug on GitLab Community Edition version 16.6.1 and shared their results on AttackerKB said CVE-2023-7028 was, “Very effective and easy to exploit.”

Nearly two weeks after patches became available, 5,379 vulnerable instances of GitLab were detected worldwide by the Shadowserver Foundation. The nonprofit organization, which monitors malicious activity online, posted the data from Jan. 23 on X, noting that the United States and Germany had the most vulnerable instances, with 964 and 730 respectively.

Shadowserver’s dashboard tool showed fewer vulnerable instances (4,652) on Jan. 24. A Shadowserver spokesperson confirmed with SC Media that there was "a drop in detected vulnerable instances, which is a positive development," but that more time would be needed to determine whether this decrease was a trend or a "blip" in Shadowserver's scans.

GitLab customers with self-managed instances of the affected products — GitLab Community Edition and GitLab Enterprise Edition — should review their logs for exploitation of CVE-2023-7028 using the two following methods, as outlined by GitLab:

  • Check gitlab-rails/production_json.log for HTTP requests to the /users/password path with params.value.email consisting of a JSON array with multiple email addresses
  • Check gitlabs-rails/audit_json.log for entries with meta.caller.id of PasswordsController#create and target_Details consisting of a JSON array with multiple email addresses

The company said no exploitation of the bug on GitLab.com or GitLab Dedicated instances has been detected.

GitLab recommended customers also enable two-factor authentication (2FA), which prevents account takeover via CVE-2023-7028, although users of unpatched instances are still vulnerable to being locked out of their accounts if an attacker exploits the flaw to reset their password.

联系我们 contact @ memedata.com