CVE-2023-6195Server-Side Request Forgery in Gitlab

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 83.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 31

Description

An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages5 packages

CVEListV5gitlab/gitlab15.516.9.7+2
NVDgitlab/gitlab15.5.016.9.7+2
debiandebian/gitlab< gitlab 17.3.5-2 (sid)
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-2xjp-r9f7-cm2x: An issue has been discovered in GitLab CE/EE affecting all versions starting from 152025-01-31
OSV
CVE-2023-6195: An issue has been discovered in GitLab CE/EE affecting all versions starting from 152025-01-31

📋Vendor Advisories

2
GitLab
CVE-2023-6195: An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and star2025-01-31
Debian
CVE-2023-6195: gitlab - An issue has been discovered in GitLab CE/EE affecting all versions starting fro...2023