First published: Mon Dec 30 2019(Updated: )
An issue was discovered in GitLab Enterprise Edition 11.3.x and 11.4.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows XSS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.3.0<11.4.13 | |
GitLab | >=11.3.0<11.4.13 | |
GitLab | >=11.5.0<11.5.6 | |
GitLab | >=11.5.0<11.5.6 | |
GitLab | >=11.6.0<11.6.1 | |
GitLab | >=11.6.0<11.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20491 is classified as a medium severity vulnerability due to its potential impact through cross-site scripting (XSS).
To fix CVE-2018-20491, upgrade GitLab to version 11.4.13 or later, 11.5.6 or later, or 11.6.1 or later.
The impact of CVE-2018-20491 includes the ability for attackers to execute arbitrary JavaScript in the context of a user's session.
CVE-2018-20491 affects GitLab Enterprise Edition versions 11.3.x through 11.4.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1.
Yes, GitLab Community Edition is also affected by CVE-2018-20491 within the same version ranges as the Enterprise Edition.