First published: Tue Jun 08 2021(Updated: )
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=10.5<13.10.5 | |
GitLab GitLab | >=13.11<13.11.5 | |
GitLab GitLab | >=13.12<13.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22214 is a server-side request forgery vulnerability in GitLab CE/EE that allows an unauthenticated attacker to exploit requests to the internal network for webhooks.
All versions of GitLab CE/EE starting from 10.5 up to 13.12.2 are affected by CVE-2021-22214.
CVE-2021-22214 has a severity rating of 8.6, which is considered high.
An unauthenticated attacker can exploit CVE-2021-22214 by sending requests to the internal network for webhooks.
You can find more information about CVE-2021-22214 on the GitLab security advisory page and the HackerOne report linked in the references.