CVE-2021-22175
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to send malicious requests to internal services within a GitLab instance, potentially exposing sensitive data or causing disruptions. It can be exploited by anyone, even if they are not logged in, as long as the GitLab instance has webhooks enabled and is running a version from 10.5 onward.
Technical Description
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jun 11, 2021
over 4 years ago
Last Modified
Feb 18, 2026
2 days ago
Vendor
gitlab
Product
gitlab