First published: Wed Mar 24 2021(Updated: )
Insufficient input sanitization in wikis in GitLab version 13.8 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted commit to a wiki
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.8.0<13.8.5 | |
GitLab | >=13.8.0<13.8.5 | |
GitLab | >=13.9.0<13.9.2 | |
GitLab | >=13.9.0<13.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22185 has a high severity rating due to the potential for stored cross-site scripting attacks.
To fix CVE-2021-22185, upgrade your GitLab installation to version 13.8.5 or later, or 13.9.2 or later.
CVE-2021-22185 affects GitLab versions 13.8.0 through 13.8.5 and 13.9.0 through 13.9.2 for both community and enterprise editions.
CVE-2021-22185 allows an attacker to conduct stored cross-site scripting attacks via specially crafted wiki commits.
Yes, CVE-2021-22185 specifically affects the wiki feature in GitLab.