Server-Side Request Forgery (SSRF) in GitLab Enterprise Edition and Gitlab Community Edition - CVE-2019-15730

 

Server-Side Request Forgery (SSRF) in GitLab Enterprise Edition and Gitlab Community Edition - CVE-2019-15730

Published: September 18, 2019


Vulnerability identifier: #VU21177
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-15730
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: GitLab, Inc
Affected software:
GitLab Enterprise Edition
Gitlab Community Edition

Detailed vulnerability description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in the Jira integration. A remote attacker can send a specially crafted HTTP request to any resources accessible in the local network by the GitLab server and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


How to mitigate CVE-2019-15730

Install updates from vendor's website.

Sources