First published: Mon Oct 04 2021(Updated: )
A Stored XSS in merge request creation page in all versions of Gitlab EE starting from 13.7 before 14.1.7, all versions starting from 14.2 before 14.2.5, and all versions starting from 14.3 before 14.3.1 allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious approval rule names
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<14.1.7 | |
GitLab | >=14.2.0<14.2.5 | |
GitLab | =14.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39885 has a medium severity rating due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2021-39885, update your GitLab EE installation to version 14.1.7 or 14.2.5 and later.
CVE-2021-39885 affects GitLab EE versions starting from 13.7 before 14.1.7, from 14.2 before 14.2.5, and from 14.3 before 14.3.1.
CVE-2021-39885 allows an attacker to execute arbitrary JavaScript code via a stored XSS vulnerability.
Yes, CVE-2021-39885 exposes user data to potential theft or manipulation due to the stored XSS vulnerability.