GitLab 9.3.7 fixed a security problem that was not listed in the patch release update. We recommend users on GitLab 9.3.0 to 9.3.6 to upgrade to 9.3.9 or newer.
This bug was introduced in GitLab 9.3.0 and can be triggered when an instance loses connectivity to the Redis cluster. In this situation the server may create a new application settings entry in the database using the GitLab defaults. In a worst-case scenario an instance with sign-ups initially disabled may have that setting enabled, allowing users to register.
A fix for this bug was included with GitLab CE+EE versions 9.3.7 and 9.4.0. The fix does not restore any settings that have been reset to defaults. All users running GitLab instances versions 9.3.0 or newer should verify that their application settings are still correct. Users running instances with sign-ups disabled should verify that no unauthorized accounts have been created.
Users running GitLab CE+EE versions prior to 9.3.0 and users of GitLab.com are not affected.
More details can be found in the issue.
Thanks to Ramon Smit of DALTCORE for reporting the full impact of this vulnerability to us.
We want to hear from you
Enjoyed reading this blog post or have questions or feedback? Share your thoughts by creating a new topic in the GitLab community forum.Share your feedback