Lucene search

K
jvnJapan Vulnerability NotesJVN:93667442
HistoryJun 17, 2022 - 12:00 a.m.

JVN#93667442: Gitlab vulnerable to server-side request forgery

2022-06-1700:00:00
Japan Vulnerability Notes
jvn.jp
16

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

38.9%

Gitlab contains a server-side request forgery vulnerability (CWE-918) through the Project Import feature.

Impact

The vulnerability allows an attacker to make arbitrary HTTP/HTTPS or git requests inside a GitLab instance’s network.

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has released the following versions that address the vulnerability.

  • Gitlab 14.7.1
  • Gitlab 14.6.4
  • Gitlab 14.5.4

Products Affected

  • Gitlab versions 14.7 to the version prior to 14.7.1
  • Gitlab versions 14.6 to the version prior to 14.6.4
  • Gitlab versions 10.5 to the version prior to 14.5.4

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

38.9%