First published: Thu Mar 04 2021(Updated: )
An issue has been discovered in GitLab affecting all versions starting with 11.8. GitLab was vulnerable to a stored XSS in the epics page, which could be exploited with user interactions.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.8<13.6.6 | |
GitLab | >=11.8<13.6.6 | |
GitLab | >=13.7.0<13.7.6 | |
GitLab | >=13.7.0<13.7.6 | |
GitLab | >=13.8.0<13.8.2 | |
GitLab | >=13.8.0<13.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22183 is considered a moderate severity vulnerability due to the potential for stored XSS attacks.
To fix CVE-2021-22183, upgrade GitLab to versions 13.6.6 or later, 13.7.6 or later, or 13.8.2 or later.
CVE-2021-22183 affects GitLab versions from 11.8 to 13.6.6, as well as specific versions between 13.7.0 and 13.7.6, and between 13.8.0 and 13.8.2.
CVE-2021-22183 is a stored cross-site scripting (XSS) vulnerability located in the epics page of GitLab.
Yes, exploitation of CVE-2021-22183 requires user interaction.