CVE-2021-22175

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to send malicious requests to internal services within a GitLab instance, potentially exposing sensitive data or causing disruptions. It can be exploited by anyone, even if they are not logged in, as long as the GitLab instance has webhooks enabled and is running a version from 10.5 onward.

Technical Description

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 1713 days

Quick Information

Published

Jun 11, 2021

over 4 years ago

Last Modified

Feb 18, 2026

2 days ago

Vendor

gitlab

Product

gitlab