First published: Wed Mar 21 2018(Updated: )
Gitlab Community Edition version 10.2.4 is vulnerable to lack of input validation in the labels component resulting in persistent cross site scripting.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.0.0<=9.5.10 | |
GitLab | >=9.0.0<=9.5.10 | |
GitLab | >=10.0.0<=10.1.5 | |
GitLab | >=10.0.0<=10.1.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.2.0<=10.2.5 | |
GitLab | >=10.3.0<=10.3.3 | |
GitLab | >=10.3.0<=10.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0924 is classified as a medium severity vulnerability due to its potential for persistent cross-site scripting.
To fix CVE-2017-0924, upgrade to GitLab Community Edition or Enterprise Edition version 10.2.5 or later.
CVE-2017-0924 affects GitLab versions from 9.0.0 to 10.2.4 inclusive.
CVE-2017-0924 is a persistent cross-site scripting (XSS) vulnerability.
Yes, CVE-2017-0924 can be exploited to inject malicious scripts that persist across sessions.