debian-mirror-gitlab/doc/security/webhooks.md

89 lines
3.9 KiB
Markdown
Raw Normal View History

2019-09-04 21:01:54 +05:30
---
type: concepts, reference, howto
---
2019-09-30 21:07:59 +05:30
2016-06-02 11:05:42 +05:30
# Webhooks and insecure internal web services
2015-04-26 12:48:37 +05:30
2019-09-04 21:01:54 +05:30
If you have non-GitLab web services running on your GitLab server or within its
local network, these may be vulnerable to exploitation via Webhooks.
2015-04-26 12:48:37 +05:30
2019-09-04 21:01:54 +05:30
With [Webhooks](../user/project/integrations/webhooks.md), you and your project
maintainers and owners can set up URLs to be triggered when specific changes
occur in your projects. Normally, these requests are sent to external web services
specifically set up for this purpose, that process the request and its attached
data in some appropriate way.
2015-04-26 12:48:37 +05:30
2019-09-04 21:01:54 +05:30
Things get hairy, however, when a Webhook is set up with a URL that doesn't
point to an external, but to an internal service, that may do something
completely unintended when the webhook is triggered and the POST request is
sent.
2015-04-26 12:48:37 +05:30
2019-09-04 21:01:54 +05:30
Because Webhook requests are made by the GitLab server itself, these have
complete access to everything running on the server (`http://localhost:123`) or
within the server's local network (`http://192.168.1.12:345`), even if these
services are otherwise protected and inaccessible from the outside world.
2015-04-26 12:48:37 +05:30
2019-09-04 21:01:54 +05:30
If a web service does not require authentication, Webhooks can be used to
trigger destructive commands by getting the GitLab server to make POST requests
to endpoints like `http://localhost:123/some-resource/delete`.
2015-04-26 12:48:37 +05:30
2019-09-04 21:01:54 +05:30
To prevent this type of exploitation from happening, starting with GitLab 10.6,
all Webhook requests to the current GitLab instance server address and/or in a
private network will be forbidden by default. That means that all requests made
to 127.0.0.1, ::1 and 0.0.0.0, as well as IPv4 10.0.0.0/8, 172.16.0.0/12,
192.168.0.0/16 and IPv6 site-local (ffc0::/10) addresses won't be allowed.
2018-10-15 14:42:47 +05:30
2019-09-04 21:01:54 +05:30
This behavior can be overridden by enabling the option *"Allow requests to the
2019-10-12 21:52:04 +05:30
local network from web hooks and services"* in the *"Outbound requests"* section
2019-09-04 21:01:54 +05:30
inside the Admin area under **Settings**
(`/admin/application_settings/network`):
2018-10-15 14:42:47 +05:30
2019-10-12 21:52:04 +05:30
![Outbound requests admin settings](img/outbound_requests_section_v12_2.png)
2018-10-15 14:42:47 +05:30
2019-10-12 21:52:04 +05:30
NOTE: **Note:**
*System hooks* are enabled to make requests to local network by default since they are
set up by administrators. However, you can turn this off by disabling the
**Allow requests to the local network from system hooks** option.
## Whitelist for local requests
> [Introduced](https://gitlab.com/gitlab-org/gitlab-ce/issues/44496) in GitLab 12.2
You can allow certain domains and IP addresses to be accessible to both *system hooks*
and *webhooks* even when local requests are not allowed by adding them to the
whitelist. Navigate to **Admin Area > Settings > Network** (`/admin/application_settings/network`)
and expand **Outbound requests**:
![Outbound local requests whitelist](img/whitelist.png)
The whilelist entries can be separated by semicolons, commas or whitespaces
(including newlines) and be in different formats like hostnames, IP addresses and/or
IP ranges. IPv6 is supported. Hostnames that contain unicode characters should
use IDNA encoding.
The whitelist can hold a maximum of 1000 entries. Each entry can be a maximum of
255 characters.
Example:
```text
example.com;gitlab.example.com
127.0.0.1,1:0:0:0:0:0:0:1
127.0.0.0/8 1:0:0:0:0:0:0:0/124
```
NOTE: **Note:**
Wildcards (`*.example.com`) and ports (`127.0.0.1:3000`) are not currently supported.
2019-09-04 21:01:54 +05:30
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->