gitlab

maximum-severity-gitlab-flaw-allowing-account-hijacking-under-active-exploitation

Maximum-severity GitLab flaw allowing account hijacking under active exploitation

A 10 OUT OF 10 —

The threat is potentially grave because it could be used in supply-chain attacks.

Maximum-severity GitLab flaw allowing account hijacking under active exploitation

A maximum severity vulnerability that allows hackers to hijack GitLab accounts with no user interaction required is now under active exploitation, federal government officials warned as data showed that thousands of users had yet to install a patch released in January.

A change GitLab implemented in May 2023 made it possible for users to initiate password changes through links sent to secondary email addresses. The move was designed to permit resets when users didn’t have access to the email address used to establish the account. In January, GitLab disclosed that the feature allowed attackers to send reset emails to accounts they controlled and from there click on the embedded link and take over the account.

While exploits require no user interaction, hijackings work only against accounts that aren’t configured to use multifactor authentication. Even with MFA, accounts remained vulnerable to password resets, but the attackers ultimately are unable to access the account, allowing the rightful owner to change the reset password. The vulnerability, tracked as CVE-2023-7028, carries a severity rating of 10 out of 10.

On Wednesday, the US Cybersecurity and Infrastructure Security Agency said it is aware of “evidence of active exploitation” and added the vulnerability to its list of known exploited vulnerabilities. CISA provided no details about the in-the-wild attacks. A GitLab representative declined to provide specifics about the active exploitation of the vulnerability.

The vulnerability, classified as an improper access control flaw, could pose a grave threat. GitLab software typically has access to multiple development environments belonging to users. With the ability to access them and surreptitiously introduce changes, attackers could sabotage projects or plant backdoors that could infect anyone using software built in the compromised environment. An example of a similar supply chain attack is the one that hit SolarWinds in 2020 and pushed malware to more than 18,000 of its customers, 100 of whom received follow-on hacks. Other recent examples of supply chain attacks are here, here, and here.

These sorts of attacks are powerful. By hacking a single, carefully selected target, attackers gain the means to infect thousands of downstream users, often without requiring them to take any action at all.

According to Internet scans performed by security organization Shadowserver, more than 2,100 IP addresses showed they were hosting one or more vulnerable GitLab instances.

Shadowserver

The biggest concentration of IP addresses was in India, followed by the US, Indonesia, Algeria, and Thailand.

Shadowserver

The number of IP addresses showing vulnerable instances has fallen over time. Shadowserver shows that there were more than 5,300 addresses on January 22, one week after GitLab issued the patch.

Shadowserver

The vulnerability is classed as an improper access control flaw.

CISA has ordered all civilian federal agencies that have yet to patch the vulnerability to do so immediately. The agency made no mention of MFA, but any GitLab users who haven’t already done so should enable it, ideally with a form that complies with the FIDO industry standard.

GitLab users should also remember that patching does nothing to secure systems that have already been breached through exploits. GitLab has published incident response guidance here.

Maximum-severity GitLab flaw allowing account hijacking under active exploitation Read More »

switch-emulator-suyu-hit-by-gitlab-dmca,-project-lives-on-through-self-hosting

Switch emulator Suyu hit by GitLab DMCA, project lives on through self-hosting

They can run… —

Developer says there’s “no way to confirm” if Nintendo was involved in takedown.

Is a name like

Enlarge / Is a name like “Suyu” ironic enough to avoid facing a lawsuit?

Suyu

Switch emulator Suyu—a fork of the Nintendo-targeted and now-defunct emulation project Yuzu—has been taken down from GitLab following a DMCA request Thursday. But the emulation project’s open source files remain available on a self-hosted git repo on the Suyu website, and recent compiled binaries remain available on an extant GitLab repo.

While the DMCA takedown request has not yet appeared on GitLab’s public repository of such requests, a GitLab spokesperson confirmed to The Verge that the project was taken down after the site received notice “from a representative of the rightsholder.” GitLab has not specified who made the request or how they represented themselves; a representative for Nintendo was not immediately available to respond to a request for comment.

An email to Suyu contributors being shared on the project’s Discord server includes the following cited justification in the DMCA request:

Suyu is based off of Yuzu code, which violates Section 1201 of the DMCA. Suyu, like yuzu, is primarily designed to circumvent Nintendo’s technical protection measures, namely Suyu unlawfully uses unauthorized copies of cryptographic keys to decrypt unauthorized copies of Nintendo Switch games, or ROMs, at or immediately before runtime without Nintendo’s authorization. Therefore, the distribution of Suyu also constitutes unlawful trafficking of a circumvention technology.

A Suyu Discord moderator going by the handle Princess Twilight Sparkle shared a message Thursday evening citing the project’s “legal team” in reporting that Suyu will have to use the self-hosted Git repo “in the foreseeable future. Getting our GitLab back most likely needs us to go through a lawsuit, which is going to be very difficult… Thanks for your understanding.”

Troy, listed as a “Core Suyu Developer” in the Discord server, wrote Thursday afternoon that the DMCA request came from an “unknown source” and that there is “no way to confirm” if Nintendo was involved. “There is also a possibility that the person who sent this DMCA is a copyright troll, like on YouTube, based on the wording of the DMCA reason that was sent to GitLab,” Troy wrote.

Suyu Discord moderator and contributor Sharpie told Ars Technica that “we don’t have any more information than you at this time.”

Earlier this month, Sharpie outlined to Ars many steps the project’s developers were taking to avoid potential legal consequences, including avoiding “any monetization” and taking a hardline stance on any discussion of piracy. Despite those precautions, Sharpie admitted to Ars that “Suyu currently exists in a legal gray area we are trying to work our way out of.”

Switch emulator Suyu hit by GitLab DMCA, project lives on through self-hosting Read More »