Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6jpw-pq5v-3x7w

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

EPSS

Процентиль: 100%
0.92569
Критический

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 6.8
ubuntu
около 4 лет назад

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

CVSS3: 6.8
nvd
около 4 лет назад

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

CVSS3: 6.8
debian
около 4 лет назад

When requests to the internal network for webhooks are enabled, a serv ...

CVSS3: 8.6
fstec
больше 4 лет назад

Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 100%
0.92569
Критический

Дефекты

CWE-918