4.3
CVSSv2

CVE-2021-22214

Published: 08/06/2021 Updated: 16/06/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.6 | Impact Score: 4 | Exploitability Score: 3.9
VMScore: 385
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitlab gitlab

Vendor Advisories

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 105 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited ...

Github Repositories

Hi 👋, I'm Yulio Ramadhan Just an ordinary person with unordinary dreams 🌱 I’m currently learning Offensive Security 📝 I regularly write articles on yuraveongithubio/ Blogs posts [Write-Up] CVE-2021-22214 Gitlab SSRF di Website Lokal Metodologi Bug Bounty V30 by XSSRAT Google Dorking - Seni Dalam Mencari Instalasi Hyperion Crypter 231 di

POC for CVE-2021-22214: Gitlab SSRF

CVE-2021-22214 POC for CVE-2021-22214: Gitlab SSRF Description The remote GitLab install contains a Server-side request forgery (SSRF) vulnerability as a result of the internal network for webhooks being enabled A remote, unauthenticated attacker can exploit a registration-limited GitLab instance causing it to make HTTP requests to an arbitrary domain of the attacker's c

Gitlab SSRF

gitlab-cve-2021-22214 Gitlab SSRF Follow us Vulnmachines YouTube Twitter Facebook LinkedIn

Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214

CVE-2021-22214 Description POC for CVE-2021-22214: Gitlab CI Lint API未授权 SSRF漏洞 create by antx at 2021-11-01 Detail When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 105 was possible to exploit for an unauthenticated attacker even on a GitLab ins

Nmap script to guess* a GitLab version.

gitlab-version-nse Nmap script to guess* a GitLab version Usage git clone githubcom/righel/gitlab-version-nse cd gitlab-version-nse nmap <target> --script /gitlab_versionnse [--script-args="showcves", --script-args="subdir=/custom-subdir"] use --script-args="showcves" to get versio

a Curated list of gitlab vulnerability

Gitlab-CVE a Curated list of gitlab vulnerability CVE-2021-22205 [critical] An issue has been discovered in GitLab CE/EE affecting all versions starting from 119 GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution targetcom/users/sign_in CVE-2021-22214 [

HypeJab is a deliberately vulnerable web application intended for benchmarking automated scanners.

HypeJab 💉 HypeJab serves as a purposeful target for evaluating the effectiveness of automated scanners, designed specifically to exploit its vulnerabilities This web application is intentionally crafted to highlight common security flaws found in online systems By offering a controlled environment for scanning tools to assess their accuracy and efficiency, HypeJab facilita

HypeJab is a deliberately vulnerable web application intended for benchmarking automated scanners.

HypeJab 💉 HypeJab serves as a purposeful target for evaluating the effectiveness of automated scanners, designed specifically to exploit its vulnerabilities This web application is intentionally crafted to highlight common security flaws found in online systems By offering a controlled environment for scanning tools to assess their accuracy and efficiency, HypeJab facilita