First published: Mon Mar 28 2022(Updated: )
A vulnerability was discovered in GitLab starting with version 12. GitLab was vulnerable to a blind SSRF attack since requests to shared address space were not blocked.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0<=14.5.4 | |
GitLab | >=14.6<=14.6.4 | |
GitLab | >=14.7<=14.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-0249 is considered medium as it allows for a blind SSRF attack.
To fix CVE-2022-0249, upgrade GitLab to version 14.5.5 or later, 14.6.5 or later, or 14.7.2 or later.
CVE-2022-0249 affects GitLab versions from 12.0 up to 14.7.1, excluding 14.5.5, 14.6.5, and 14.7.2.
CVE-2022-0249 is associated with a blind SSRF (Server-Side Request Forgery) attack.
No specific workaround is recommended for CVE-2022-0249, and upgrading is the best course of action.