[Japanese]

JVNDB-2022-000046

Gitlab vulnerable to server-side request forgery

Overview

Gitlab contains a server-side request forgery vulnerability (CWE-918) through the Project Import feature.

Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to the developer and coordinated.
After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.4 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 5.5 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


GitLab.org
  • GitLab versions 14.7 to the version prior to 14.7.1
  • GitLab versions 14.6 to the version prior to 14.6.4
  • GitLab versions 10.5 to the version prior to 14.5.4

Impact

The vulnerability allows an attacker to make arbitrary HTTP/HTTPS or git requests inside a GitLab instance's network.
Solution

[Update the software]
Update the software to the latest version according to the information provided by the developer.
The developer has released the following versions that address the vulnerability.
  • Gitlab 14.7.1
  • Gitlab 14.6.4
  • Gitlab 14.5.4
Vendor Information

GitLab.org
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2022-0136
References

  1. JVN : JVN#93667442
Revision History

  • [2022/06/17]
      Web page was published