First published: Wed Mar 21 2018(Updated: )
Gitlab Community Edition version 9.1 is vulnerable to lack of input validation in the IPython notebooks component resulting in persistent cross site scripting.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | =9.5.10 | |
GitLab | =9.5.10 | |
GitLab | =10.1.5 | |
GitLab | =10.1.5 | |
GitLab | =10.2.5 | |
GitLab | =10.2.5 | |
GitLab | =10.3.3 | |
GitLab | =10.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0923 is classified as a medium severity vulnerability due to its potential for persistent cross-site scripting.
To fix CVE-2017-0923, upgrade to GitLab versions 10.3.4 or later, or apply the recommended patches from GitLab.
CVE-2017-0923 affects GitLab versions 9.5.10, 10.1.5, 10.2.5, and 10.3.3.
CVE-2017-0923 enables persistent cross-site scripting attacks, which can compromise user data and session information.
There is no official workaround for CVE-2017-0923; the best mitigation is to update to a non-vulnerable version of GitLab.