First published: Wed Mar 21 2018(Updated: )
Gitlab Community Edition version 10.2.4 is vulnerable to lack of input validation in the CI job component resulting in persistent cross site scripting.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gitlab | 16.0.8+ds1-2 | |
GitLab | >=10.1.0<=10.1.5 | |
GitLab | >=10.1.0<=10.1.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.3.0<=10.3.3 | |
GitLab | >=10.3.0<=10.3.3 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0917 has a medium severity rating due to its potential for persistent cross-site scripting attacks.
To fix CVE-2017-0917, upgrade your GitLab installation to version 10.2.5 or later.
CVE-2017-0917 affects GitLab versions between 10.1.0 and 10.2.4.
CVE-2017-0917 affects both the GitLab Community and Enterprise editions.
CVE-2017-0917 allows attackers to inject malicious scripts that can affect users who interact with the compromised CI job component.