First published: Fri Jan 27 2023(Updated: )
A blind SSRF vulnerability was identified in all versions of GitLab EE prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which allows an attacker to connect to a local host.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.4.6 | |
GitLab | >=15.5.0<15.5.5 | |
GitLab | >=15.6<15.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4335 is classified as a moderate severity vulnerability that could lead to unauthorized access.
To mitigate CVE-2022-4335, you should upgrade GitLab to version 15.4.6, 15.5.5, or 15.6.1 and later.
CVE-2022-4335 affects all versions of GitLab EE before 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1.
CVE-2022-4335 is a blind Server-Side Request Forgery (SSRF) vulnerability.
Yes, CVE-2022-4335 allows an attacker to connect to a local host, potentially accessing internal services.