• Thread starter News
  • Start date
  • " /> News - Maximum-severity GitLab flaw allowing account hijacking under active exploitation | SoftoolStore.de - Софт, Avid Media Composer, Книги. | бесплатные прокси (HTTP, Socks 4, Socks 5)

    News Maximum-severity GitLab flaw allowing account hijacking under active exploitation

    News

    Staff member
    Редактор
    Messages
    15,019
    Points
    358
    Offline
    #1

    Enlarge


    A maximum severity vulnerability that allows hackers to hijack GitLab accounts with no user interaction required is now under active exploitation, federal government officials warned as data showed that thousands of users had yet to install a patch released in January.

    A change GitLab implemented in May 2023 made it possible for users to initiate password changes through links sent to secondary email addresses. The move was designed to permit resets when users didn’t have access to the email address used to establish the account. In January, GitLab disclosed that the feature allowed attackers to send reset emails to accounts they controlled and from there click on the embedded link and take over the account.

    While exploits required no user interaction, hijackings worked only against accounts that weren’t configured to use multi-factor authentication. Even with MFA, accounts remained vulnerable to password resets. The vulnerability, tracked as CVE-2023-7028, carries a severity rating of 10 out of a possible 10.


    Read 9 remaining paragraphs | Comments
     
    Top Bottom