An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/432276 | Exploit Issue Tracking |
https://hackerone.com/reports/2249268 | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
05 Aug 2025, 20:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:* |
|
First Time |
Gitlab
Gitlab gitlab |
|
References | () https://gitlab.com/gitlab-org/gitlab/-/issues/432276 - Exploit, Issue Tracking | |
References | () https://hackerone.com/reports/2249268 - Permissions Required |
18 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
31 Jan 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-31 00:15
Updated : 2025-08-05 20:55
NVD link : CVE-2023-6195
Mitre link : CVE-2023-6195
CVE.ORG link : CVE-2023-6195
JSON object : View
Products Affected
gitlab
- gitlab
CWE
CWE-918
Server-Side Request Forgery (SSRF)