[Japanese]
|
JVNDB-2022-000046
|
Gitlab vulnerable to server-side request forgery
|
Gitlab contains a server-side request forgery vulnerability (CWE-918) through the Project Import feature.
Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to the developer and coordinated.
After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 5.4 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity: Base Metrics 5.5 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: None
|
|
GitLab.org
- GitLab versions 14.7 to the version prior to 14.7.1
- GitLab versions 14.6 to the version prior to 14.6.4
- GitLab versions 10.5 to the version prior to 14.5.4
|
|
The vulnerability allows an attacker to make arbitrary HTTP/HTTPS or git requests inside a GitLab instance's network.
|
[Update the software]
Update the software to the latest version according to the information provided by the developer.
The developer has released the following versions that address the vulnerability.
- Gitlab 14.7.1
- Gitlab 14.6.4
- Gitlab 14.5.4
|
GitLab.org
|
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2022-0136
|
- JVN : JVN#93667442
- National Vulnerability Database (NVD) : CVE-2022-0136
|
- [2022/06/17]
Web page was published
- [2024/06/20]
References : Content was added
|