First published: Thu Dec 10 2020(Updated: )
A XSS vulnerability exists in Gitlab CE/EE from 12.4 before 13.4.7, 13.5 before 13.5.5, and 13.6 before 13.6.2 that allows an attacker to perform cross-site scripting to other users via importing a malicious project
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.4.0<13.4.7 | |
GitLab | >=12.4.0<13.4.7 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.6.0<13.6.2 | |
GitLab | >=13.6.0<13.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26407 is classified as a high severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2020-26407, upgrade GitLab CE/EE to versions 13.4.7, 13.5.5, or 13.6.2 or later.
CVE-2020-26407 affects GitLab CE/EE versions 12.4 through 13.4.6, 13.5 through 13.5.4, and 13.6 through 13.6.1.
CVE-2020-26407 allows an attacker to perform cross-site scripting (XSS) by importing a malicious project.
Yes, user interaction is required as the victim must import the malicious project.