First published: Sun Dec 17 2017(Updated: )
GitLab 9.4.x before 9.4.2 does not support LDAP SSL certificate verification, but a verify_certificates LDAP option was mentioned in the 9.4 release announcement. This issue occurred because code was not merged. This is related to use of the omniauth-ldap library and the gitlab_omniauth-ldap gem.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | =9.4.0 | |
GitLab | =9.4.0-rc1 | |
GitLab | =9.4.0-rc2 | |
GitLab | =9.4.0-rc3 | |
GitLab | =9.4.0-rc4 | |
GitLab | =9.4.0-rc5 | |
GitLab | =9.4.0-rc6 | |
GitLab | =9.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17716 is classified as a medium severity vulnerability due to potential unauthorized access risks.
To fix CVE-2017-17716, upgrade GitLab to version 9.4.2 or later which includes LDAP SSL certificate verification support.
CVE-2017-17716 affects GitLab versions 9.4.0 and 9.4.1.
CVE-2017-17716 implies that LDAP connections on affected versions do not validate SSL certificates, which could expose users to man-in-the-middle attacks.
There are no documented workarounds for CVE-2017-17716, so it is recommended to update to a patched version.