First published: Mon Sep 09 2019(Updated: )
An input validation and output encoding issue was discovered in the GitLab CE/EE wiki pages feature which could result in a persistent XSS. This vulnerability was addressed in 12.1.2, 12.0.4, and 11.11.6.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.11.2<11.11.7 | |
GitLab | >=11.11.2<11.11.7 | |
GitLab | >=12.0.0<12.0.4 | |
GitLab | >=12.0.0<12.0.4 | |
GitLab | >=12.1.0<12.1.2 | |
GitLab | >=12.1.0<12.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5467 has been classified as a moderate severity vulnerability.
To fix CVE-2019-5467, update GitLab to version 12.1.2, 12.0.4, or 11.11.6 or later.
CVE-2019-5467 is an input validation and output encoding issue that can lead to a persistent cross-site scripting (XSS) exploit.
CVE-2019-5467 affects GitLab versions prior to 12.1.2, 12.0.4, and 11.11.6.
Yes, CVE-2019-5467 affects both GitLab Community Edition (CE) and Enterprise Edition (EE).