First published: Tue Jan 28 2020(Updated: )
A flawed DNS rebinding protection issue was discovered in GitLab CE/EE 10.2 and later in the `url_blocker.rb` which could result in SSRF where the library is utilized.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=10.2.0<11.11.7 | |
GitLab GitLab | >=10.2.0<11.11.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5464 is a flawed DNS rebinding protection issue discovered in GitLab CE/EE 10.2 and later in the `url_blocker.rb` which could result in SSRF when the library is utilized.
GitLab CE/EE versions 10.2.0 to 11.11.7 are affected by CVE-2019-5464.
CVE-2019-5464 has a severity rating of 9.8 (Critical).
To fix CVE-2019-5464, upgrade your GitLab installation to version 11.11.8 or later.
You can find more information about CVE-2019-5464 at the following references: [Link 1](https://about.gitlab.com/releases/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/), [Link 2](https://gitlab.com/gitlab-org/gitlab-ce/issues/63959), [Link 3](https://hackerone.com/reports/632101).