-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-22175 - Server-Side Request Forgery in GitLab Webhooks #11182
Comments
/bounty $100 |
💎 $100 bounty • ProjectDiscovery Bounty Available for CVE Template ContributionSteps to Contribute:
Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!
Add a bounty • Share on socials
|
/attempt #11182 Options |
is it duplicate of CVE-2021-22214? |
Ahh, yeah it looks it |
@princechaddha I understand if the bounty is removed as it turns out a detection template already exists at http/cves/2021/CVE-2021-22214.yaml that also applies to CVE-2021-22175 |
@CodeStuffBreakThings, I will go ahead and close this issue since the CVE was added after I validated using cvemap to check if the CVE has a template. Good luck with the other open issue up for reward. Thanks. |
The bounty is up for grabs! Everyone is welcome to |
Is there an existing template for this?
Template requests
Template Request
Title: CVE-2021-22175 - Server-Side Request Forgery in GitLab Webhooks
Description:
GitLab versions starting from 10.5 contain a server-side request forgery (SSRF) vulnerability that could be exploited by an unauthenticated attacker to send requests to the internal network. This vulnerability occurs in the webhook functionality of GitLab, even on instances where user registration is disabled, allowing potential unauthorized access to internal services.
Severity:
Critical (CVSS: 9.8, Vector: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H])
EPSS:
PoCs:
References:
Patch URLs:
Nuclei Templates:
Weaknesses:
Shodan:
Vulnerable CPE:
OSS:
Anything else?
No response
The text was updated successfully, but these errors were encountered: