JVN#93667442
Gitlab vulnerable to server-side request forgery
Overview
Gitlab contains a server-side request forgery vulnerability.
Products Affected
- Gitlab versions 14.7 to the version prior to 14.7.1
- Gitlab versions 14.6 to the version prior to 14.6.4
- Gitlab versions 10.5 to the version prior to 14.5.4
Description
Gitlab contains a server-side request forgery vulnerability (CWE-918) through the Project Import feature.
Impact
The vulnerability allows an attacker to make arbitrary HTTP/HTTPS or git requests inside a GitLab instance's network.
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has released the following versions that address the vulnerability.
- Gitlab 14.7.1
- Gitlab 14.6.4
- Gitlab 14.5.4
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2022-0136 |
JVN iPedia |
JVNDB-2022-000046 |