{"vulnerability": "CVE-2024-3114", "sightings": [{"uuid": "afa6feeb-98b3-4828-9a6c-ae83b547b4f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31141", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113508762467656373", "content": "", "creation_timestamp": "2024-11-19T08:51:03.790023Z"}, {"uuid": "360cadf8-dd3e-471b-8e6d-22af62d280ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31141", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3668", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31141\n\ud83d\udd25 CVSS Score: 6.4 (CVSS_V3)\n\ud83d\udd39 Description: Files or Directories Accessible to External Parties, Improper Privilege Management vulnerability in Apache Kafka Clients.\n\nApache Kafka Clients accept configuration data for customizing behavior, and includes ConfigProvider plugins in order to manipulate these configurations. Apache Kafka also provides FileConfigProvider, DirectoryConfigProvider, and EnvVarConfigProvider implementations which include the ability to read from disk or environment variables.\nIn applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use these ConfigProviders to read arbitrary contents of the disk and environment variables.\n\nIn particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment access, which may be undesirable in certain environments, including SaaS products.\nThis issue affects Apache Kafka Clients: from 2.3.0 through 3.5.2, 3.6.2, 3.7.0.\n\n\nUsers with affected applications are recommended to upgrade kafka-clients to version &gt;=3.8.0, and set the JVM system property \"org.apache.kafka.automatic.config.providers=none\".\nUsers of Kafka Connect with one of the listed ConfigProvider implementations specified in their worker config are also recommended to add appropriate \"allowlist.pattern\" and \"allowed.paths\" to restrict their operation to appropriate bounds.\n\n\nFor users of Kafka Clients or Kafka Connect in environments that trust users with disk and environment variable access, it is not recommended to set the system property.\nFor users of the Kafka Broker, Kafka MirrorMaker 2.0, Kafka Streams, and Kafka command-line tools, it is not recommended to set the system property.\n\ud83d\udccf Published: 2024-11-19T09:30:54Z\n\ud83d\udccf Modified: 2025-01-31T15:44:59Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-31141\n2. https://github.com/apache/kafka\n3. https://lists.apache.org/thread/9whdzfr0zwdhr364604w5ssnzmg4v2lv\n4. https://security.netapp.com/advisory/ntap-20250131-0001\n5. http://www.openwall.com/lists/oss-security/2024/11/18/5", "creation_timestamp": "2025-01-31T16:14:56.000000Z"}, {"uuid": "96412aaf-f0ad-4c3a-a1ca-ef2e35be91bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31144", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114004117985533356", "content": "", "creation_timestamp": "2025-02-14T20:26:29.131700Z"}, {"uuid": "8cf9aeea-13e5-4a8d-b993-8269603b3226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31144", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li64qoka2g2n", "content": "", "creation_timestamp": "2025-02-14T21:15:42.035131Z"}, {"uuid": "e00c29c4-6f7f-4356-bf39-da8abbb6c59b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31141", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "1cf8645e-4a7d-44e5-ac80-7094857e3a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-31141", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "421ec7fd-f0ca-4c65-85b4-bdf6d8f6bf30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31143", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13582", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31143\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An optional feature of PCI MSI called \"Multiple Message\" allows a\ndevice to use multiple consecutive interrupt vectors.  Unlike for MSI-X,\nthe setting up of these consecutive vectors needs to happen all in one\ngo.  In this handling an error path could be taken in different\nsituations, with or without a particular lock held.  This error path\nwrongly releases the lock even when it is not currently held.\n\n\ud83d\udccf Published: 2024-07-18T13:31:31.244Z\n\ud83d\udccf Modified: 2025-04-26T20:03:16.232Z\n\ud83d\udd17 References:\n1. https://xenbits.xenproject.org/xsa/advisory-458.html", "creation_timestamp": "2025-04-26T20:08:32.000000Z"}, {"uuid": "aa551adf-26fc-408e-ad1a-038d8f02f23a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31144", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13581", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31144\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: For a brief summary of Xapi terminology, see:\n\n   https://xapi-project.github.io/xen-api/overview.html#object-model-overview \n\nXapi contains functionality to backup and restore metadata about Virtual\nMachines and Storage Repositories (SRs).\n\nThe metadata itself is stored in a Virtual Disk Image (VDI) inside an\nSR.  This is used for two purposes; a general backup of metadata\n(e.g. to recover from a host failure if the filer is still good), and\nPortable SRs (e.g. using an external hard drive to move VMs to another\nhost).\n\nMetadata is only restored as an explicit administrator action, but\noccurs in cases where the host has no information about the SR, and must\nlocate the metadata VDI in order to retrieve the metadata.\n\nThe metadata VDI is located by searching (in UUID alphanumeric order)\neach VDI, mounting it, and seeing if there is a suitable metadata file\npresent.  The first matching VDI is deemed to be the metadata VDI, and\nis restored from.\n\nIn the general case, the content of VDIs are controlled by the VM owner,\nand should not be trusted by the host administrator.\n\nA malicious guest can manipulate its disk to appear to be a metadata\nbackup.\n\nA guest cannot choose the UUIDs of its VDIs, but a guest with one disk\nhas a 50% chance of sorting ahead of the legitimate metadata backup.  A\nguest with two disks has a 75% chance, etc.\n\ud83d\udccf Published: 2025-02-14T20:16:39.941Z\n\ud83d\udccf Modified: 2025-04-26T20:03:17.226Z\n\ud83d\udd17 References:\n1. https://xenbits.xen.org/xsa/advisory-459.html", "creation_timestamp": "2025-04-26T20:08:31.000000Z"}, {"uuid": "55d23c3d-4730-4f7d-baa0-8e1d4c0458d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31144", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4496", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31144\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: For a brief summary of Xapi terminology, see:\n\n   https://xapi-project.github.io/xen-api/overview.html#object-model-overview \n\nXapi contains functionality to backup and restore metadata about Virtual\nMachines and Storage Repositories (SRs).\n\nThe metadata itself is stored in a Virtual Disk Image (VDI) inside an\nSR.  This is used for two purposes; a general backup of metadata\n(e.g. to recover from a host failure if the filer is still good), and\nPortable SRs (e.g. using an external hard drive to move VMs to another\nhost).\n\nMetadata is only restored as an explicit administrator action, but\noccurs in cases where the host has no information about the SR, and must\nlocate the metadata VDI in order to retrieve the metadata.\n\nThe metadata VDI is located by searching (in UUID alphanumeric order)\neach VDI, mounting it, and seeing if there is a suitable metadata file\npresent.  The first matching VDI is deemed to be the metadata VDI, and\nis restored from.\n\nIn the general case, the content of VDIs are controlled by the VM owner,\nand should not be trusted by the host administrator.\n\nA malicious guest can manipulate its disk to appear to be a metadata\nbackup.\n\nA guest cannot choose the UUIDs of its VDIs, but a guest with one disk\nhas a 50% chance of sorting ahead of the legitimate metadata backup.  A\nguest with two disks has a 75% chance, etc.\n\ud83d\udccf Published: 2025-02-14T21:31:05Z\n\ud83d\udccf Modified: 2025-02-14T21:31:05Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-31144\n2. https://xenbits.xen.org/xsa/advisory-459.html\n3. http://www.openwall.com/lists/oss-security/2024/07/16/4", "creation_timestamp": "2025-02-14T22:10:49.000000Z"}, {"uuid": "7b67ca86-a720-4b87-9668-72221fa72637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31144", "type": "seen", "source": "https://t.me/cvedetector/18137", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31144 - Xen API Metadata Backup Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31144 \nPublished : Feb. 14, 2025, 9:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : For a brief summary of Xapi terminology, see:  \n  \n      \n  \nXapi contains functionality to backup and restore metadata about Virtual  \nMachines and Storage Repositories (SRs).  \n  \nThe metadata itself is stored in a Virtual Disk Image (VDI) inside an  \nSR.  This is used for two purposes; a general backup of metadata  \n(e.g. to recover from a host failure if the filer is still good), and  \nPortable SRs (e.g. using an external hard drive to move VMs to another  \nhost).  \n  \nMetadata is only restored as an explicit administrator action, but  \noccurs in cases where the host has no information about the SR, and must  \nlocate the metadata VDI in order to retrieve the metadata.  \n  \nThe metadata VDI is located by searching (in UUID alphanumeric order)  \neach VDI, mounting it, and seeing if there is a suitable metadata file  \npresent.  The first matching VDI is deemed to be the metadata VDI, and  \nis restored from.  \n  \nIn the general case, the content of VDIs are controlled by the VM owner,  \nand should not be trusted by the host administrator.  \n  \nA malicious guest can manipulate its disk to appear to be a metadata  \nbackup.  \n  \nA guest cannot choose the UUIDs of its VDIs, but a guest with one disk  \nhas a 50% chance of sorting ahead of the legitimate metadata backup.  A  \nguest with two disks has a 75% chance, etc. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T00:08:35.000000Z"}, {"uuid": "cf92fd3c-c157-4544-b611-fce0343e8042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31146", "type": "seen", "source": "https://t.me/cvedetector/6305", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31146 - VMware Multi-Device Resource Sharing Security Oversight\", \n  \"Content\": \"CVE ID : CVE-2024-31146 \nPublished : Sept. 25, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : When multiple devices share resources and one of them is to be passed  \nthrough to a guest, security of the entire system and of respective  \nguests individually cannot really be guaranteed without knowing  \ninternals of any of the involved guests.  Therefore such a configuration  \ncannot really be security-supported, yet making that explicit was so far  \nmissing.  \n  \nResources the sharing of which is known to be problematic include, but  \nare not limited to  \n- - PCI Base Address Registers (BARs) of multiple devices mapping to the  \n  same page (4k on x86),  \n- - INTx lines. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T14:19:22.000000Z"}, {"uuid": "2bb1bd62-aa93-4cdc-9191-829b4b7b23f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31141", "type": "seen", "source": "https://t.me/cvedetector/11440", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31141 - Apache Kafka Clients Unauthorized Disk and Environment Variable Access Abuse\", \n  \"Content\": \"CVE ID : CVE-2024-31141 \nPublished : Nov. 19, 2024, 9:15 a.m. | 35\u00a0minutes ago \nDescription : Files or Directories Accessible to External Parties, Improper Privilege Management vulnerability in Apache Kafka Clients.  \n  \nApache Kafka Clients accept configuration data for customizing behavior, and includes ConfigProvider plugins in order to manipulate these configurations. Apache Kafka also provides FileConfigProvider, DirectoryConfigProvider, and EnvVarConfigProvider implementations which include the ability to read from disk or environment variables.  \nIn applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use these ConfigProviders to read arbitrary contents of the disk and environment variables.  \n  \nIn particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment access, which may be undesirable in certain environments, including SaaS products.  \nThis issue affects Apache Kafka Clients: from 2.3.0 through 3.5.2, 3.6.2, 3.7.0.  \n  \n  \nUsers with affected applications are recommended to upgrade kafka-clients to version &gt;=3.8.0, and set the JVM system property \"org.apache.kafka.automatic.config.providers=none\".  \nUsers of Kafka Connect with one of the listed ConfigProvider implementations specified in their worker config are also recommended to add appropriate \"allowlist.pattern\" and \"allowed.paths\" to restrict their operation to appropriate bounds.  \n  \n  \nFor users of Kafka Clients or Kafka Connect in environments that trust users with disk and environment variable access, it is not recommended to set the system property.  \nFor users of the Kafka Broker, Kafka MirrorMaker 2.0, Kafka Streams, and Kafka command-line tools, it is not recommended to set the system property. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T10:57:31.000000Z"}, {"uuid": "bca7647c-4d51-40d3-a7db-b60859831796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31141", "type": "seen", "source": "https://t.me/CyberBulletin/1525", "content": "\u26a1\ufe0fCVE-2024-31141: Apache Kafka Vulnerability Exposes User Data to Potential Attackers.\n\n#CyberBulletin", "creation_timestamp": "2024-11-19T08:50:17.000000Z"}, {"uuid": "67e91d97-0405-4e5b-b19c-b5e6283f783c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31145", "type": "seen", "source": "https://t.me/cvedetector/6303", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31145 - \"VMware Memory Region Mapping Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-31145 \nPublished : Sept. 25, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : Certain PCI devices in a system might be assigned Reserved Memory  \nRegions (specified via Reserved Memory Region Reporting, \"RMRR\") for  \nIntel VT-d or Unity Mapping ranges for AMD-Vi.  These are typically used  \nfor platform tasks such as legacy USB emulation.  \n  \nSince the precise purpose of these regions is unknown, once a device  \nassociated with such a region is active, the mappings of these regions  \nneed to remain continuouly accessible by the device.  In the logic  \nestablishing these mappings, error handling was flawed, resulting in  \nsuch mappings to potentially remain in place when they should have been  \nremoved again.  Respective guests would then gain access to memory  \nregions which they aren't supposed to have access to. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T14:19:20.000000Z"}, {"uuid": "1fdff865-e1fb-42c0-92fb-0f958ea7f449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31143", "type": "seen", "source": "https://t.me/cvedetector/1153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31143 - \"PCI MSI Multiple Message Feature Lock Corruption Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-31143 \nPublished : July 18, 2024, 2:15 p.m. | 28\u00a0minutes ago \nDescription : An optional feature of PCI MSI called \"Multiple Message\" allows a  \ndevice to use multiple consecutive interrupt vectors.  Unlike for MSI-X,  \nthe setting up of these consecutive vectors needs to happen all in one  \ngo.  In this handling an error path could be taken in different  \nsituations, with or without a particular lock held.  This error path  \nwrongly releases the lock even when it is not currently held. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T16:47:41.000000Z"}, {"uuid": "726d526a-29f2-4eba-8983-7dc7dcc2e89b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3114", "type": "seen", "source": "https://t.me/cvedetector/2788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3114 - GitLab Regular Expression DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3114 \nPublished : Aug. 8, 2024, 11:15 a.m. | 30\u00a0minutes ago \nDescription : An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T13:53:45.000000Z"}, {"uuid": "6ba93ead-32a6-46b8-bb37-ca4e204d32a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31141", "type": "seen", "source": "https://t.me/CyberBulletin/26499", "content": "\u26a1\ufe0fCVE-2024-31141: Apache Kafka Vulnerability Exposes User Data to Potential Attackers.\n\n#CyberBulletin", "creation_timestamp": "2024-11-19T08:50:17.000000Z"}, {"uuid": "de87d9e5-7af4-4482-ab57-376b48671481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3114", "type": "seen", "source": "https://t.me/MrVGunz/1259", "content": "\ud83d\udccd\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u062f\u06cc\u0645\u06cc #GitLab\n\n\u06af\u0632\u0627\u0631\u0634\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u062e\u06cc\u0631 \u0646\u0634\u0627\u0646 \u0627\u0632 \u0648\u062c\u0648\u062f \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u062f\u06cc\u0645\u06cc GitLab \u062f\u0627\u0631\u062f. #\u0645\u0647\u0627\u062c\u0645\u0627\u0646_\u0633\u0627\u06cc\u0628\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0636\u0639\u0641\u200c\u0647\u0627 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0634\u0645\u0627 \u0646\u0641\u0648\u0630 \u06a9\u0646\u0646\u062f. \u0628\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0642\u0627\u062f\u0631 \u062e\u0648\u0627\u0647\u0646\u062f \u0628\u0648\u062f \u062a\u0627 \u0628\u0647 #\u0627\u0637\u0644\u0627\u0639\u0627\u062a_\u062d\u0633\u0627\u0633 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f\u060c \u06a9\u0646\u062a\u0631\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u062f\u0631 \u062f\u0633\u062a \u0628\u06af\u06cc\u0631\u0646\u062f \u0648 \u06cc\u0627 \u062d\u062a\u06cc \u062e\u062f\u0645\u0627\u062a \u0634\u0645\u0627 \u0631\u0627 \u0645\u062e\u062a\u0644 \u06a9\u0646\u0646\u062f.\n\n\u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631:\n- \u0646\u0633\u062e\u0647 GitLab #Community_Edition\n- \u0646\u0633\u062e\u0647 GitLab #Enterprise_Edition \n- \u0648 \u062a\u0645\u0627\u0645\u06cc \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644 \u0627\u0632 17.2.2\u060c 17.1.4 \u0648 17.0.6\n\n\u062e\u0637\u0631\u0627\u062a \u0627\u062d\u062a\u0645\u0627\u0644\u06cc:\n- #\u0627\u0631\u062a\u0642\u0627\u0621_\u0633\u0637\u062d_\u062f\u0633\u062a\u0631\u0633\u06cc: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0647 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0627\u0644\u0627\u062a\u0631\u06cc \u0627\u0631\u062a\u0642\u0627 \u06cc\u0627\u0641\u062a\u0647 \u0648 \u0628\u0647 \u0628\u062e\u0634\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0633\u06cc\u0633\u062a\u0645 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f.\n- #\u062f\u0648\u0631_\u0632\u062f\u0646_\u0645\u06a9\u0627\u0646\u06cc\u0632\u0645\u200c\u0647\u0627\u06cc_\u0627\u0645\u0646\u06cc\u062a\u06cc: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u0645\u06a9\u0627\u0646\u06cc\u0632\u0645\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u06af\u0630\u0631 \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0645\u062d\u0631\u0645\u0627\u0646\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f.\n- #\u062d\u0645\u0644\u0647_XSS: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0627 \u062a\u0632\u0631\u06cc\u0642 \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628\u060c \u0639\u0645\u0644\u06a9\u0631\u062f \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u0645\u062e\u062a\u0644 \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f.\n- #\u062d\u0645\u0644\u0647_DoS: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0627 \u0627\u06cc\u062c\u0627\u062f \u0628\u0627\u0631 \u06a9\u0627\u0631\u06cc \u0632\u06cc\u0627\u062f\u060c \u062e\u062f\u0645\u0627\u062a \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0645\u062e\u062a\u0644 \u06a9\u0631\u062f\u0647 \u0648 \u062f\u0631 \u062f\u0633\u062a\u0631\u0633 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0642\u0631\u0627\u0631 \u0646\u062f\u0647\u0646\u062f.\n- #\u0627\u0641\u0634\u0627\u06cc_\u0627\u0637\u0644\u0627\u0639\u0627\u062a_\u062d\u0633\u0627\u0633: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633\u06cc \u0645\u0627\u0646\u0646\u062f \u06af\u0630\u0631\u0648\u0627\u0698\u0647\u200c\u0647\u0627\u060c \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0648 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u062c\u0627\u0631\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u0636\u0631\u0648\u0631\u06cc:\n\u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0648 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0647\u0631\u06af\u0648\u0646\u0647 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647\u060c \u0628\u0647 \u0634\u062f\u062a \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0646\u0633\u062e\u0647 GitLab \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u06cc\u06a9\u06cc \u0627\u0632 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646 17.2.2\u060c 17.1.4 \u06cc\u0627 17.0.6 \u0627\u0631\u062a\u0642\u0627 \u062f\u0647\u06cc\u062f. \u0628\u0631\u0627\u06cc \u06a9\u0633\u0628 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0628\u06cc\u0634\u062a\u0631 \u0648 \u062f\u0631\u06cc\u0627\u0641\u062a \u0631\u0627\u0647\u0646\u0645\u0627\u06cc\u06cc\u200c\u0647\u0627\u06cc \u0641\u0646\u06cc\u060c \u0628\u0647 \u0648\u0628\u200c\u0633\u0627\u06cc\u062a \u0631\u0633\u0645\u06cc GitLab \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f.\n\n\u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc #CVE:\nCVE-2024-2800\u060c CVE-2024-3035\u060c CVE-2024-3114\u060c CVE-2024-3958\u060c CVE-2024-4207\u060c CVE-2024-4210\u060c CVE-2024-4784\u060c CVE-2024-5423\u060c CVE-2024-6329\u060c CVE-2024-6356 \u0648 CVE-2024-7586\n\n\u0647\u0634\u062f\u0627\u0631: \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0627\u0647\u0645\u06cc\u062a \u0628\u0627\u0644\u0627\u06cc \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u0628\u0647 \u0633\u0631\u0639\u062a \u0627\u0642\u062f\u0627\u0645 \u0628\u0647 \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0633\u06cc\u0633\u062a\u0645 \u062e\u0648\u062f \u06a9\u0646\u06cc\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647 \u0628\u0647 \u0627\u06cc\u0646 \u0633\u0627\u06cc\u062a \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/gitlab-multiple-vulnerabilities_20240812\n\n\ud83d\udccd Critical Vulnerabilities in Older Versions of #GitLab\n\nRecent security reports have identified several serious vulnerabilities in older versions of GitLab. #Cyber_Attackers can exploit these weaknesses to infiltrate your systems. By leveraging these vulnerabilities, attackers could gain access to #Sensitive_Information, take control of your system, or even disrupt your services.\n\nAffected Versions:\n- GitLab #Community_Edition\n- GitLab #Enterprise_Edition\n- All versions prior to 17.2.2, 17.1.4, and 17.0.6\n\nPotential Risks:\n- #Privilege_Escalation: Attackers could elevate their access level and gain entry to sensitive parts of the system.\n- #Security_Bypass: Attackers may circumvent security mechanisms and access confidential information.\n- #XSS_Attacks: Malicious code injection could disrupt software functionality and compromise user data.\n- #DoS_Attacks: Attackers might overload the system, making it unavailable to users.\n- #Sensitive_Data_Exposure: Attackers could access sensitive data such as passwords, user information, and business data.\n\nNecessary Actions:\nTo address these vulnerabilities and prevent exploitation, it is strongly recommended to update your GitLab version to one of the secure versions: 17.2.2, 17.1.4, or 17.0.6. For more information and technical guidance, visit the official GitLab website.\n\nCVE Identifiers:\nCVE-2024-2800, CVE-2024-3035, CVE-2024-3114, CVE-2024-3958, CVE-2024-4207, CVE-2024-4210, CVE-2024-4784, CVE-2024-5423, CVE-2024-6329, CVE-2024-6356, and CVE-2024-7586\n\nWarning: Due to the critical nature of these vulnerabilities, update your system immediately.\n\n\ud83d\udd17 Read the full article here:\n\n\ud83c\udf10 https://www.hkcert.org/security-bulletin/gitlab-multiple-vulnerabilities_20240812", "creation_timestamp": "2024-08-20T04:31:33.000000Z"}]}