First published: Thu Aug 05 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0. It was possible to exploit a stored cross-site-scripting via a specifically crafted default branch name.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.1.0<14.1.2 | |
GitLab | >=14.1.0<14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22241 has a medium severity rating due to its potential to cause stored cross-site scripting vulnerabilities.
To fix CVE-2021-22241, upgrade your GitLab installation to the latest version that is patched against this vulnerability.
CVE-2021-22241 affects all GitLab CE/EE versions starting from 14.0 up to and including 14.1.2.
Yes, CVE-2021-22241 can be exploited remotely through the manipulation of default branch names.
User interaction is not required to exploit CVE-2021-22241, making it a more severe risk for vulnerable installations.