CVE-2021-22214
MEDIUM EXPLOITED NUCLEIGitlab < 13.10.5 - SSRF
Title source: ruleDescription
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
Exploits (5)
Nuclei Templates (1)
Gitlab CE/EE 10.5 - Server-Side Request Forgery
HIGHby Suman_Kar,GitLab Red Team
Shodan:
http.title:"GitLab" || cpe:"cpe:2.3:a:gitlab:gitlab" || http.title:"gitlab"
FOFA:
title="gitlab"
Scores
CVSS v3
6.8
EPSS
0.9268
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Details
VulnCheck KEV
2023-12-12
CWE
CWE-918
Status
published
Products (1)
gitlab/gitlab
10.5 - 13.10.5
Published
Jun 08, 2021
Tracked Since
Feb 18, 2026