Vulnerability Description
A flawed DNS rebinding protection issue was discovered in GitLab CE/EE 10.2 and later in the `url_blocker.rb` which could result in SSRF where the library is utilized.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 10.2.0, < 11.11.7 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/releases/2019/07/29/security-release-gitlab-12-dot-1-doPatchRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-ce/issues/63959ExploitVendor Advisory
- https://hackerone.com/reports/632101Permissions Required
- https://about.gitlab.com/releases/2019/07/29/security-release-gitlab-12-dot-1-doPatchRelease NotesVendor Advisory
- https://gitlab.com/gitlab-org/gitlab-ce/issues/63959ExploitVendor Advisory
- https://hackerone.com/reports/632101Permissions Required
FAQ
What is CVE-2019-5464?
CVE-2019-5464 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A flawed DNS rebinding protection issue was discovered in GitLab CE/EE 10.2 and later in the `url_blocker.rb` which could result in SSRF where the library is utilized.
How severe is CVE-2019-5464?
CVE-2019-5464 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-5464?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.