Blind SSRF in FogBugz project import
Medium
G
GitLab
Submitted None
Actions:
Reported by
mike12
Vulnerability Details
Technical details and impact analysis
### Steps to reproduce
1. Run GitLab `docker run --detach --hostname gitlab.example.com --publish 443:443 --publish 80:80 --publish 22:22 --name gitlab gitlab/gitlab-ce:latest`
2. Connect to the GitLab Docker container: `docker exec -it gitlab /bin/bash`
3. Install netcat: `apt update && apt install -y netcat`
4. Run server in container: `nc -llvp 12345`
5. Use http://localhost:12345 as FogBugz URL (see screenshot)
{F602736}
#### Results of GitLab environment info
```
root@gitlab:/# gitlab-rake gitlab:env:info
System information
System:
Current User: git
Using RVM: no
Ruby Version: 2.6.3p62
Gem Version: 2.7.9
Bundler Version:1.17.3
Rake Version: 12.3.2
Redis Version: 3.2.12
Git Version: 2.22.0
Sidekiq Version:5.2.7
Go Version: unknown
GitLab information
Version: 12.3.5
Revision: 2417d5becc7
Directory: /opt/gitlab/embedded/service/gitlab-rails
DB Adapter: PostgreSQL
DB Version: 10.9
URL: http://gitlab.example.com
HTTP Clone URL: http://gitlab.example.com/some-group/some-project.git
SSH Clone URL: [email protected]:some-group/some-project.git
Using LDAP: no
Using Omniauth: yes
Omniauth Providers:
GitLab Shell
Version: 10.0.0
Repository storage paths:
- default: /var/opt/gitlab/git-data/repositories
GitLab Shell path: /opt/gitlab/embedded/service/gitlab-shell
Git: /opt/gitlab/embedded/bin/git
```
## Impact
The vulnerability allows an attacker to make arbitrary requests inside a GitLab instance's network.
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Server-Side Request Forgery (SSRF)