First published: Thu Nov 04 2021(Updated: )
Improper validation of ipynb files in GitLab CE/EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.5.0<14.2.6 | |
GitLab | >=13.5.0<14.2.6 | |
GitLab | >=14.3.0<14.3.4 | |
GitLab | >=14.3.0<14.3.4 | |
GitLab | >=14.4.0<14.4.1 | |
GitLab | >=14.4.0<14.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39906 has a high severity rating due to its potential for executing arbitrary JavaScript code.
To fix CVE-2021-39906, update GitLab to the latest version that is above 14.4.1.
GitLab versions from 13.5.0 up to 14.4.1 are affected by CVE-2021-39906.
CVE-2021-39906 can facilitate attacks allowing execution of arbitrary JavaScript on behalf of the victim.
There is no official workaround for CVE-2021-39906, so it is recommended to apply the update as soon as possible.