First published: Mon Sep 09 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2. It has Improper Encoding or Escaping of Output. The branch name on new merge request notification emails isn't escaped, which could potentially lead to XSS issues.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=6.0.0<11.8.9 | |
GitLab | >=6.0.0<11.8.9 | |
GitLab | >=11.9.0<11.9.10 | |
GitLab | >=11.9.0<11.9.10 | |
GitLab | >=11.10.0<11.10.2 | |
GitLab | >=11.10.0<11.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11547 has a medium severity rating due to its potential for cross-site scripting (XSS) attacks through unescaped branch names.
To fix CVE-2019-11547, upgrade to GitLab Community or Enterprise Edition version 11.8.9, 11.9.10, or 11.10.2 or later.
The affected versions for CVE-2019-11547 are all versions before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2.
CVE-2019-11547 can potentially allow an attacker to exploit unescaped outputs in merge request notification emails, leading to XSS vulnerabilities.
Yes, CVE-2019-11547 affects both the GitLab Community Edition and the Enterprise Edition.