CVE-2023-6195

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-6195
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6195.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-6195
Aliases
Downstream
Published
2025-01-30T23:45:10.780Z
Modified
2025-11-30T11:16:03.629850Z
Severity
  • 2.6 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Server-Side Request Forgery (SSRF) in GitLab
Details

An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository.

Database specific
{
    "cna_assigner": "GitLab",
    "cwe_ids": [
        "CWE-918"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6195.json"
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "15.5"
        },
        {
            "fixed": "16.9.7"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.10"
        },
        {
            "fixed": "16.10.5"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "versions": [
        {
            "introduced": "16.11"
        },
        {
            "fixed": "16.11.2"
        }
    ]
}

Affected versions

v16.*

v16.10.0-ee
v16.10.1-ee
v16.10.2-ee
v16.10.3-ee
v16.10.4-ee
v16.11.0-ee
v16.11.1-ee

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6195.json"