First published: Mon Apr 04 2022(Updated: )
Improper neutralization of user input in GitLab CE/EE versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to exploit XSS by injecting HTML in notes.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.4.0<14.7.7 | |
GitLab | >=14.4.0<14.7.7 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.8.0<14.8.5 | |
GitLab | >=14.9.0<14.9.2 | |
GitLab | >=14.9.0<14.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-1175 is considered high due to its potential to allow attackers to execute arbitrary JavaScript in victim browsers.
To fix CVE-2022-1175, it is recommended to upgrade GitLab to version 14.7.7, 14.8.5, or 14.9.2 or later.
CVE-2022-1175 affects GitLab CE/EE versions 14.4 through 14.7.6, 14.8.0 through 14.8.4, and 14.9.0 through 14.9.1.
Yes, CVE-2022-1175 can be exploited remotely by attackers through injected HTML content.
CVE-2022-1175 enables attackers to perform Cross-Site Scripting (XSS) attacks, potentially leading to data theft or unauthorized actions.