First published: Thu Apr 05 2018(Updated: )
GitLab Community and Enterprise Editions version 8.4 up to 10.4 are vulnerable to XSS because a lack of input validation in the merge request component leads to cross site scripting (specifically, filenames in changes tabs of merge requests). This is fixed in 10.6.3, 10.5.7, and 10.4.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.4<10.4.7 | |
GitLab | >=8.4<10.4.7 | |
GitLab | >=10.5.0<10.5.7 | |
GitLab | >=10.5.0<10.5.7 | |
GitLab | >=10.6.0<10.6.3 | |
GitLab | >=10.6.0<10.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9243 has a medium severity level due to its potential to exploit cross-site scripting (XSS) vulnerabilities.
To fix CVE-2018-9243, upgrade to GitLab versions 10.6.3, 10.5.7, or 10.4.7.
CVE-2018-9243 affects GitLab Community and Enterprise Editions versions from 8.4 up to 10.4.
CVE-2018-9243 is classified as a cross-site scripting (XSS) vulnerability.
The merge request component of GitLab is vulnerable in CVE-2018-9243 due to a lack of input validation.