{"uuid": "a411f0d1-4132-4f29-bf62-142750e28076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6195", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3544", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-6195\n\ud83d\udd25 CVSS Score: 2.6 (CVSS_V3)\n\ud83d\udd39 Description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown  image value when importing a GitHub repository.\n\ud83d\udccf Published: 2025-01-31T00:30:44Z\n\ud83d\udccf Modified: 2025-01-31T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-6195\n2. https://hackerone.com/reports/2249268\n3. https://gitlab.com/gitlab-org/gitlab/-/issues/432276", "creation_timestamp": "2025-01-31T01:12:28.000000Z"}