First published: Tue Sep 29 2020(Updated: )
A vulnerability was discovered in GitLab versions prior to 13.1. Username format restrictions could be bypassed allowing for html tags to be added.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <12.10.13 | |
GitLab | >=13.0.0<13.0.8 | |
GitLab | >=13.1.0<13.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13321 has a medium severity, primarily due to the potential for cross-site scripting attacks through user-inputted HTML tags.
To fix CVE-2020-13321, upgrade your GitLab instance to version 13.1 or later.
CVE-2020-13321 affects GitLab versions prior to 13.1, specifically versions 12.10.13, 13.0.8 to 13.0.0, and 13.1.2 to 13.1.0.
CVE-2020-13321 can be exploited to perform cross-site scripting (XSS) attacks through the addition of HTML tags in usernames.
Yes, CVE-2020-13321 specifically affects self-managed GitLab installations and may not apply to GitLab.com.