First published: Sat Apr 15 2023(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via a loopback address to the validate_localhost function in url_blocker.rb.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.1.7 | |
GitLab | <11.1.7 | |
GitLab | >=11.2.0<11.2.4 | |
GitLab | >=11.2.0<11.2.4 | |
GitLab | =11.3.0 | |
GitLab | =11.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17452 is considered a high severity vulnerability due to its potential for Server-Side Request Forgery (SSRF).
To fix CVE-2018-17452, upgrade GitLab to version 11.1.7, 11.2.4, or 11.3.1 or later.
CVE-2018-17452 affects GitLab Community and Enterprise Editions before version 11.1.7, between 11.2.0 and 11.2.4, and exactly version 11.3.0.
CVE-2018-17452 is classified as a Server-Side Request Forgery (SSRF) vulnerability.
Exploiting CVE-2018-17452 can allow attackers to perform unauthorized requests to internal services of the server.