CVE STALKER

CVE-2021-22214

CVSS
DESCRIPTIONWhen requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
HEAT SCORE201

WORDS

TWEETS

DATE TWEETS USER
2021-08-22 05:50:05CVE-2021-22214 When requests to the internal network for webhooks are enabled, a server-side request forgery vulne… https://t.co/wyiK4QAvEf https://twitter.com/i/web/status/1429319060119031811VulmonFeeds
2021-08-18 11:10:30Interesting. reporte CVE-2021-22214 And triaget wrote me it is informative and close the report 😂😂😂😂GochaOqradze
2021-08-12 10:10:14GitLab SSRF (CVE-2021-22214) https://t.co/EOqDqL8l7k #Nessus https://www.tenable.com/plugins/nessus/152483SecurityNewsbot
2021-08-12 07:20:06GitLab SSRF (CVE-2021-22214) https://t.co/N81zMBNjO4 https://ift.tt/3CIBJG6cc_cyberdefence
2021-07-03 19:20:06#Gitlab SSRF attack | #CVE-2021-22214 https://t.co/myHcnkHvhb #infosec #cybersecurity https://youtu.be/kVWTT3VwebURapidSafeguard
2021-06-28 15:40:04@Samm0uda Yes, i have reported CVE-2021-22214 Unauthenticated Gitlab SSRF and retina from H1 requested more informa… https://t.co/L2Zj4eKJAL https://twitter.com/i/web/status/1409536379982340103Alra3ees
2021-06-26 03:50:10GitLab CE/EE >=10.5 SSRF (CVE-2021-22214) POC: curl -s --show-error -H 'Content-Type: application/json' --data '{… https://t.co/fW5Fz92llG https://twitter.com/i/web/status/1408631591044206594Acardia2020
2021-06-26 03:00:34CVE-2021-22214 SSRF https://t.co/RUu5ZL8cXz https://twitter.com/sec715/status/1408218852245135362hackercat1215
2021-06-25 00:31:14BOOM🔥🔥 Gitlab SSRF (CVE-2021-22214). POC: curl -s --show-error -H 'Content-Type: application/json' --data '{ "incl… https://t.co/i2PBYLhwhZ https://twitter.com/i/web/status/1408218852245135362sec715
2021-06-16 20:30:16New post from https://t.co/9KYxtdZjkl (CVE-2021-22214 (gitlab)) has been published on https://t.co/MP9QrnQlHZ http://www.sesin.at https://www.sesin.at/2021/06/16/cve-2021-22214-gitlab/www_sesin_at
2021-06-16 20:30:12New post from https://t.co/uXvPWJy6tj (CVE-2021-22214 (gitlab)) has been published on https://t.co/rfUnFO1Fru http://www.sesin.at https://www.sesin.at/2021/06/16/cve-2021-22214-gitlab/WolfgangSesin
2021-06-16 16:40:32🚨 NEW: CVE-2021-22214 🚨 When requests to the internal network for webhooks are enabled, a server-side request forge… https://t.co/edSZMcOV7a https://twitter.com/i/web/status/1405201132163567616threatintelctr
2021-06-08 18:10:09My real name is CVE-2021-22214 but all my friends call me Slaphappy Reamer https://t.co/m4D7IvgeCI https://nvd.nist.gov/vuln/detail/CVE-2021-22214vulnonym
2021-06-08 17:20:05CVE Liste write "CVE-2021-22214" See full original article: https://t.co/PL5peppVBB All our feeds: https://t.co/EOLcNJGCHf https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22214 https://secnews.physaphae.frInfoSecPhysa
2021-06-08 16:50:07CVE-2021-22214 When requests to the internal network for webhooks are enabled, a server-side request forgery vulne… https://t.co/52YO7LdAnK https://twitter.com/i/web/status/1402305486888837127VulmonFeeds
2021-06-08 16:30:24New post from https://t.co/uXvPWJy6tj (CVE-2021-22214) has been published on https://t.co/e3g3JyqkTi http://www.sesin.at https://www.sesin.at/2021/06/08/cve-2021-22214/WolfgangSesin
2021-06-08 16:30:23New post from https://t.co/9KYxtdZjkl (CVE-2021-22214) has been published on https://t.co/zalsjB3KUe http://www.sesin.at https://www.sesin.at/2021/06/08/cve-2021-22214/www_sesin_at
2021-06-08 15:50:12CVE-2021-22214 When requests to the internal network for webhooks are enabled, a server-side request forgery vulner… https://t.co/xZaMBSRyjE https://twitter.com/i/web/status/1402290639547604996CVEnew
2021-06-08 15:10:09CVE-2021-22214 : When requests to the internal network for webhooks are enabled, a server-side request forgery vuln… https://t.co/V6BDtoi9gq https://twitter.com/i/web/status/1402280200101154823CVEreport