Server-Side Request Forgery (SSRF) Affecting gitlab package, versions <15.10.8+ds1-2
Threat Intelligence
EPSS
0.84% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-GITLAB-1305312
- published 15 Jun 2021
- disclosed 11 Jun 2021
Introduced: 11 Jun 2021
CVE-2021-22175 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
gitlab
to version 15.10.8+ds1-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gitlab
package and not the gitlab
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CVSS Scores
version 3.1