First published: Thu Apr 22 2021(Updated: )
An issue has been discovered in GitLab affecting all versions starting with 12.9. GitLab was vulnerable to a stored XSS if scoped labels were used.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.9<13.8.7 | |
GitLab | >=12.9<13.8.7 | |
GitLab | >=13.9.0<13.9.5 | |
GitLab | >=13.9.0<13.9.5 | |
GitLab | >=13.10.0<13.10.1 | |
GitLab | >=13.10.0<13.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-22199 is considered high due to its potential for stored XSS attacks.
To fix CVE-2021-22199, upgrade your GitLab instance to version 13.8.8 or later.
All GitLab versions starting from 12.9 up to 13.8.7, as well as 13.9.0 to 13.9.5, and 13.10.0 to 13.10.1 are affected by CVE-2021-22199.
CVE-2021-22199 is a stored cross-site scripting (XSS) vulnerability.
Yes, user interaction is required to exploit CVE-2021-22199, specifically through the use of scoped labels.