First published: Tue Jul 06 2021(Updated: )
Client-Side code injection through Feature Flag name in GitLab CE/EE starting with 11.9 allows a specially crafted feature flag name to PUT requests on behalf of other users via clicking on a link
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.9.0<13.11.6 | |
GitLab | >=13.9.0<13.11.6 | |
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=14.0.0<14.0.2 | |
GitLab | >=14.0.0<14.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22223 has a medium severity rating due to potential client-side code injection risks.
To fix CVE-2021-22223, update GitLab to version 13.11.6 or later, or 14.0.2 or later.
CVE-2021-22223 affects GitLab versions from 13.9.0 up to 13.11.6, and 13.12.0 up to 13.12.6, as well as 14.0.0 up to 14.0.2.
CVE-2021-22223 allows malicious users to perform unauthorized actions by exploiting specially crafted feature flag names.
CVE-2021-22223 is a client-side vulnerability that allows for code injection through user interactions.