First published: Fri Jul 27 2018(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2. XSS can occur via a Milestone name during a promotion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <10.8.7 | |
GitLab | <10.8.7 | |
GitLab | >=11.0.0<11.0.5 | |
GitLab | >=11.0.0<11.0.5 | |
GitLab | >=11.1.0<11.1.2 | |
GitLab | >=11.1.0<11.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14606 is classified as a medium severity vulnerability that allows Cross-Site Scripting (XSS) via a Milestone name during a promotion in GitLab.
To fix CVE-2018-14606, upgrade GitLab to versions 10.8.7, 11.0.5, or 11.1.2 or later.
CVE-2018-14606 affects GitLab Community and Enterprise Editions before version 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2.
CVE-2018-14606 facilitates a Cross-Site Scripting (XSS) attack, which can be executed through crafted Milestone names.
Yes, CVE-2018-14606 is specific to both the Community and Enterprise editions of GitLab prior to the fixed versions.