### [CVE-2021-22178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22178) ![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.2%2C%20%3C13.6.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.7%2C%20%3C13.7.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.8%2C%20%3C13.8.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Server-side%20request%20forgery%20(ssrf)%20in%20GitLab&color=brightgreen) ### Description An issue has been discovered in GitLab affecting all versions starting from 13.2. Gitlab was vulnerable to SRRF attack through the Prometheus integration. ### POC #### Reference No PoCs from references. #### Github - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/SexyBeast233/SecBooks - https://github.com/tzwlhack/Vulnerability