First published: Thu Nov 04 2021(Updated: )
A stored Cross-Site Scripting vulnerability in the DataDog integration in all versions of GitLab CE/EE starting from 13.7 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to execute arbitrary JavaScript code on the victim's behalf
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=13.7.0<14.0.9 | |
GitLab GitLab | >=13.7.0<14.0.9 | |
GitLab GitLab | >=14.1.0<14.1.4 | |
GitLab GitLab | >=14.1.0<14.1.4 | |
GitLab GitLab | >=14.2.0<14.2.2 | |
GitLab GitLab | >=14.2.0<14.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22260 is a stored Cross-Site Scripting vulnerability in the DataDog integration in GitLab.
All versions of GitLab CE/EE starting from 13.7 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 are affected.
An attacker can execute arbitrary JavaScript code on the victim's browser by exploiting the stored Cross-Site Scripting vulnerability in the DataDog integration in GitLab.
The severity of CVE-2021-22260 is high with a CVSS score of 5.4.
To fix CVE-2021-22260, it is recommended to upgrade GitLab CE/EE to version 14.0.9, 14.1.4, or 14.2.2 or later.