Server side request forgery protections in GitLab CE/EE versions between 8.4 and 14.4.4, between 14.5.0 and 14.5.2, and between 14.6.0 and 14.6.1 would fail to protect against attacks sending requests to localhost on port 80 or 443 if GitLab was configured to run on a port other than 80 or 443
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39927.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/340476 | Broken Link Vendor Advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39927.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/340476 | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39927.json - Vendor Advisory | |
References | () https://gitlab.com/gitlab-org/gitlab/-/issues/340476 - Broken Link, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 3.5 |
Information
Published : 2022-01-18 17:15
Updated : 2024-11-21 06:20
NVD link : CVE-2021-39927
Mitre link : CVE-2021-39927
CVE.ORG link : CVE-2021-39927
JSON object : View
Products Affected
gitlab
- gitlab
CWE
CWE-918
Server-Side Request Forgery (SSRF)