#VU54563 Cross-site request forgery in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2021-22224 

 

#VU54563 Cross-site request forgery in Gitlab Community Edition and GitLab Enterprise Edition - CVE-2021-22224

Published: July 6, 2021 / Updated: July 6, 2021


Vulnerability identifier: #VU54563
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-22224
CWE-ID: CWE-352
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Gitlab Community Edition
GitLab Enterprise Edition
Software vendor:
GitLab, Inc

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin in the GraphQL API. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website, such as call mutations as the victim.


Remediation

Install updates from vendor's website.

External links