GitLab Default Login Scanner

GitLab Default Login Scanner

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

1 minute

Time Interval

25 days 19 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

GitLab is a DevOps lifecycle tool that provides a Git repository manager with features such as issue tracking, continuous integration, and deployment. Many organizations choose to self-host GitLab for greater control over their repositories and data security. However, self-hosted instances, if not secured, may be susceptible to brute-force attacks, particularly credential stuffing.

This vulnerability focuses on detecting valid login attempts on self-hosted GitLab instances, specifically to identify possible credential stuffing risks. Credential stuffing is a brute-force attack technique where attackers use stolen usernames and passwords to gain unauthorized access to accounts. This detection checks if successful logins are possible, which could indicate insufficient login protection and vulnerability to credential stuffing.

Technically, the vulnerability is detected by simulating login attempts to GitLab’s `/users/sign_in` endpoint using a POST request with various username-password pairs. The scanner verifies successful login attempts based on specific response patterns, such as a 302 redirection and the absence of the phrase `"invalid login"` in the response body. Identifying successful login attempts indicates that the login endpoint might not be adequately secured.

Exploiting this vulnerability could allow attackers unauthorized access to GitLab repositories, configurations, and other sensitive information. Attackers could gain insights into code, deployment settings, and user data, making it critical to secure GitLab login configurations.

REFERENCES

Get started to protecting your Free Full Security Scan