{"vulnerability": "CVE-2023-6195", "sightings": [{"uuid": "d31571b2-736e-476c-a6ce-b90f825d85ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgyputu5mz2w", "content": "", "creation_timestamp": "2025-01-31T00:16:52.921937Z"}, {"uuid": "410f3b52-9a12-40a3-bd0f-ee6a82d0b3f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6195", "type": "seen", "source": "https://t.me/cvedetector/16860", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-6195 - GitLab Server Side Request Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-6195 \nPublished : Jan. 31, 2025, 12:15 a.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown  image value when importing a GitHub repository. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T02:49:20.000000Z"}, {"uuid": "a411f0d1-4132-4f29-bf62-142750e28076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6195", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3544", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-6195\n\ud83d\udd25 CVSS Score: 2.6 (CVSS_V3)\n\ud83d\udd39 Description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown  image value when importing a GitHub repository.\n\ud83d\udccf Published: 2025-01-31T00:30:44Z\n\ud83d\udccf Modified: 2025-01-31T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-6195\n2. https://hackerone.com/reports/2249268\n3. https://gitlab.com/gitlab-org/gitlab/-/issues/432276", "creation_timestamp": "2025-01-31T01:12:28.000000Z"}, {"uuid": "7a8f3a7e-5f8b-4093-80e6-b6f233480da0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6195", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113919994035542647", "content": "", "creation_timestamp": "2025-01-30T23:52:39.508902Z"}]}