Learn about CVE-2021-22202 affecting GitLab versions <13.10.1, <13.9.5, and <13.8.7. Low severity CSRF vulnerability allows attackers to exploit System hooks through the API.
An issue has been discovered in GitLab CE/EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API.
Understanding CVE-2021-22202
This CVE affects GitLab versions >=13.10 and <13.10.1, >=13.9 and <13.9.5, and <13.8.7. It was reported by @mishre through GitLab's HackerOne bug bounty program.
What is CVE-2021-22202?
CVE-2021-22202 addresses a cross-site request forgery (CSRF) vulnerability in GitLab that allows an attacker, especially when targeting an admin, to perform unauthorized actions through the API.
The Impact of CVE-2021-22202
The impact of this vulnerability is rated as LOW, with no availability impact, no confidentiality impact, and low integrity impact. However, it requires high privileges and user interaction for exploitation.
Technical Details of CVE-2021-22202
In this section, we will delve into the vulnerability description, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
The vulnerability allows malicious actors to issue a CSRF attack in System hooks through the API in GitLab CE/EE, affecting versions prior to 13.10.1.
Affected Systems and Versions
GitLab versions >=13.10 and <13.10.1, >=13.9 and <13.9.5, and <13.8.7 are vulnerable to this CSRF issue.
Exploitation Mechanism
An attacker with high privileges can exploit this vulnerability by manipulating System hooks through the API, especially when targeting admin accounts.
Mitigation and Prevention
To protect your systems from CVE-2021-22202, consider the following mitigation strategies and best security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about GitLab security advisories and CVEs to promptly apply relevant patches and updates to mitigate security risks.