Описание
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
Ссылки
- Third Party Advisory
- Broken Link
- Permissions RequiredThird Party Advisory
- Third Party Advisory
- Broken Link
- Permissions RequiredThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
6.8 Medium
CVSS3
8.6 High
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
When requests to the internal network for webhooks are enabled, a serv ...
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным
EPSS
6.8 Medium
CVSS3
8.6 High
CVSS3
4.3 Medium
CVSS2