Vulnerability Description
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 10.5, < 13.10.5 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22214.jsonThird Party Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/322926Broken Link
- https://hackerone.com/reports/1110131Permissions RequiredThird Party Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22214.jsonThird Party Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/322926Broken Link
- https://hackerone.com/reports/1110131Permissions RequiredThird Party Advisory
FAQ
What is CVE-2021-22214?
CVE-2021-22214 is a vulnerability with a CVSS score of 6.8 (MEDIUM). When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an una...
How severe is CVE-2021-22214?
CVE-2021-22214 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-22214?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.