Loading HuntDB...

Potensial SSRF via Git repository URL

Medium
G
GitLab
Submitted None

Team Summary

Official summary from GitLab

Duplicate: Fixed in 8.17.4, 8.16.8, and 8.15.8 Original report: https://hackerone.com/reports/135937 SSRF when importing a project from a Repo by URL GitLab instances that have enabled project imports using "Repo by URL" were vulnerable to Server-Side Request Forgery attacks. By specifying a project import URL of localhost an attacker could target services that are bound to the local interface of the server. These services often do not require authentication. Depending on the service an attacker might be able craft an attack using the project import request URL. This update blocks all import attempts from localhost and all bound server interfaces other than those assigned as GitLab web or SSH services (Typically ports 22 and 443). This update also blocks all import attempts from TCP ports below 1024 with the exception of ports 22, 80 and 443. 17286 Thanks to Strukt via HackerOne for reporting this vulnerability.

Reported by rootbakar___

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted

Weakness

Server-Side Request Forgery (SSRF)