First published: Mon Sep 09 2019(Updated: )
An input validation and output encoding issue was discovered in the GitLab email notification feature which could result in a persistent XSS. This was addressed in GitLab 12.1.2, 12.0.4, and 11.11.6.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.11.0<11.11.7 | |
GitLab | >=11.11.0<11.11.7 | |
GitLab | >=12.0.0<12.0.4 | |
GitLab | >=12.0.0<12.0.4 | |
GitLab | >=12.1.0<12.1.2 | |
GitLab | >=12.1.0<12.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5471 has a medium severity rating due to its potential to allow persistent XSS attacks.
To fix CVE-2019-5471, update GitLab to version 12.1.2, 12.0.4, or 11.11.6 or later.
CVE-2019-5471 affects GitLab versions from 11.11.0 to 11.11.6 and from 12.0.0 to 12.0.4.
CVE-2019-5471 enables persistent cross-site scripting (XSS) attacks through the email notification feature.
CVE-2019-5471 is considered a remote vulnerability as it can be exploited by an attacker without physical access to the system.