CVE-2022-4201Server-Side Request Forgery in Gitlab

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 71.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27
Latest updateJan 28

Description

A blind SSRF in GitLab CE/EE affecting all from 11.3 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 allows an attacker to connect to local addresses when configuring a malicious GitLab Runner.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages6 packages

NVDgitlab/gitlab11.3.015.4.6+2
debiandebian/gitlab< gitlab 15.10.8+ds1-2 (sid)
CVEListV5gitlab/gitlab>=11.3, <15.4.6, >=15.5, <15.5.5, >=15.6, <15.6.1+2
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-9ppv-xcv2-vhqr: A blind SSRF in GitLab CE/EE affecting all from 112023-01-28
OSV
CVE-2022-4201: A blind SSRF in GitLab CE/EE affecting all from 112023-01-27

📋Vendor Advisories

2
GitLab
CVE-2022-4201: A blind SSRF in GitLab CE/EE affecting all from 11.3 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 allows an attacker to connect to2023-01-27
Debian
CVE-2022-4201: gitlab - A blind SSRF in GitLab CE/EE affecting all from 11.3 prior to 15.4.6, 15.5 prior...2022