First published: Wed Apr 29 2020(Updated: )
GitLab 9.5.9 through 12.9 is vulnerable to stored XSS in an admin notification feature.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.5.9<12.7.8 | |
GitLab | >=9.5.9<12.7.8 | |
GitLab | >=12.8.0<12.8.8 | |
GitLab | >=12.8.0<12.8.8 | |
GitLab | >=12.9.0<12.9.1 | |
GitLab | >=12.9.0<12.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12276 has a medium severity rating due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2020-12276, upgrade to GitLab version 12.9.1 or later for both community and enterprise editions.
CVE-2020-12276 affects GitLab versions from 9.5.9 through 12.9, including both community and enterprise editions.
CVE-2020-12276 is categorized as a stored cross-site scripting (XSS) vulnerability.
CVE-2020-12276 was disclosed on March 26, 2020, alongside GitLab's security release.