First published: Wed Aug 25 2021(Updated: )
Insufficient input sanitization in Mermaid markdown in GitLab CE/EE version 11.4 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.4.0<13.12.9 | |
GitLab | >=11.4.0<13.12.9 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.0.0<14.0.7 | |
GitLab | >=14.1.0<14.1.2 | |
GitLab | >=14.1.0<14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22242 is classified as a medium severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2021-22242, you should upgrade GitLab to version 14.1.2, 14.0.7, or later versions.
CVE-2021-22242 affects GitLab CE/EE versions from 11.4.0 to 14.0.7.
CVE-2021-22242 is a stored cross-site scripting vulnerability stemming from insufficient input sanitization in Mermaid markdown.
No, CVE-2021-22242 is a cross-site scripting vulnerability and does not directly result in remote code execution.