cve/2019/CVE-2019-5464.md

23 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-5464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5464)
![](https://img.shields.io/static/v1?label=Product&message=GitLab%20CE%2FEE&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=Affects%20GitLab%20CE%2FEE%2010.2%20and%20later%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Fixed%20in%2012.1.2%20in%2012.0.4%20and%20in%2011.11.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Input%20Validation%20(CWE-20)&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
A flawed DNS rebinding protection issue was discovered in GitLab CE/EE 10.2 and later in the `url_blocker.rb` which could result in SSRF where the library is utilized.
### POC
#### Reference
- https://gitlab.com/gitlab-org/gitlab-ce/issues/63959
- https://hackerone.com/reports/632101
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-26 14:27:05 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ch0pin/vulnerability-review
2025-09-29 21:09:30 +02:00
- https://github.com/cyb3r-w0lf/nuclei-template-collection
2024-05-26 14:27:05 +02:00