Critical Vulnerability in GitLab
History:
- 03/06/2022 --- v1.0 -- Initial publication
 
Summary
On June 1, 2022, GitLab released updates fixing several vulnerabilities, one of which could lead to Account Take Over [1]. This critical vulnerability is identified CVE-2022-1680 with a severity score of 9.9 out of 10.
Technical Details
When group SAML SSO is configured, the System for Cross-domain Management (SCIM) feature may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users' email addresses via SCIM to an attacker controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account [2].
Affected Products
The following versions of GitLab Enterprise Edition are affected [2]:
- all versions starting from 
11.10and before14.9.5, - all versions starting from 
14.10and before14.10.4, - all versions starting from 
15.0and before15.0.1. 
To be vulnerable, the servers must be configured with SAML SSO option enabled.
Please note that the Cloud version GitLab.com is already running the last version.
Recommendations
CERT-EU strongly recommends updating GitLab servers to the last version.
CERT-EU also recommends enforcing multi-factor authentication (MFA) for users.