cvelist/2023/6xxx/CVE-2023-6195.json

110 lines
3.9 KiB
JSON
Raw Normal View History

2023-11-17 21:00:35 +00:00
{
2025-01-31 00:00:31 +00:00
"data_version": "4.0",
2023-11-17 21:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6195",
2025-01-31 00:00:31 +00:00
"ASSIGNER": "cve@gitlab.com",
"STATE": "PUBLIC"
2023-11-17 21:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-01-31 00:00:31 +00:00
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-918: Server-Side Request Forgery (SSRF)",
"cweId": "CWE-918"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitLab",
"product": {
"product_data": [
{
"product_name": "GitLab",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "15.5",
"version_value": "16.9.7"
},
{
"version_affected": "<",
"version_name": "16.10",
"version_value": "16.10.5"
},
{
"version_affected": "<",
"version_name": "16.11",
"version_value": "16.11.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/432276",
"refsource": "MISC",
"name": "https://gitlab.com/gitlab-org/gitlab/-/issues/432276"
},
{
"url": "https://hackerone.com/reports/2249268",
"refsource": "MISC",
"name": "https://hackerone.com/reports/2249268"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to versions 16.9.7, 16.10.5, 16.11.2 or above."
}
],
"credits": [
{
"lang": "en",
"value": "Thanks [imrerad](https://hackerone.com/imrerad) for reporting this vulnerability through our HackerOne bug bounty program"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"baseSeverity": "LOW"
2023-11-17 21:00:35 +00:00
}
]
}
}