First published: Tue Oct 05 2021(Updated: )
A stored Cross-Site Scripting vulnerability in the Jira integration in all GitLab versions starting from 13.9 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious Jira API responses
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.9.0<14.0.9 | |
GitLab | >=13.9.0<14.0.9 | |
GitLab | >=14.1.0<14.1.4 | |
GitLab | >=14.1.0<14.1.4 | |
GitLab | >=14.2.0<14.2.2 | |
GitLab | >=14.2.0<14.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22261 is categorized as a medium severity vulnerability due to its potential impact on users.
To fix CVE-2021-22261, upgrade GitLab to version 14.0.9 or later, or 14.1.4 or later, or 14.2.2 or later.
CVE-2021-22261 affects all GitLab versions starting from 13.9 before 14.0.9, 14.1 before 14.1.4, and 14.2 before 14.2.2.
CVE-2021-22261 is a stored Cross-Site Scripting (XSS) vulnerability.
Yes, CVE-2021-22261 can potentially be exploited remotely by an attacker to execute arbitrary JavaScript code.