First published: Mon Sep 16 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. Certain areas displaying Markdown were not properly sanitizing some XSS payloads.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.1.0<12.0.8 | |
GitLab | >=8.1.0<12.0.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.1.0<12.1.8 | |
GitLab | >=12.2.0<12.2.3 | |
GitLab | >=12.2.0<12.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-15739 is classified as a high severity vulnerability.
To fix CVE-2019-15739, upgrade GitLab to version 12.2.3 or later.
CVE-2019-15739 affects GitLab Community and Enterprise Edition versions 8.1 to 12.2.1.
CVE-2019-15739 is an XSS (Cross-Site Scripting) vulnerability related to improper sanitization of Markdown.
Yes, CVE-2019-15739 can potentially expose user data to an attacker via XSS payloads.