First published: Wed May 11 2022(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 13.9 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious text in the CI Editor and CI Pipeline details page allowing the attacker to cause uncontrolled resource consumption.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.9.0<14.8.6 | |
GitLab | >=13.9.0<14.8.6 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | >=14.9.0<14.9.4 | |
GitLab | =14.10.0 | |
GitLab | =14.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1510 has been categorized as a medium severity vulnerability.
To fix CVE-2022-1510, you should upgrade your GitLab instance to version 14.8.6 or later, or to version 14.9.4 or later.
CVE-2022-1510 affects GitLab versions from 13.9 through to 14.8.6, from 14.9.0 to 14.9.4, and the version 14.10.0.
CVE-2022-1510 exposes GitLab to potential cross-site scripting (XSS) attacks through improper handling of malicious text in the CI Editor.
There is no specific workaround for CVE-2022-1510; upgrading to a patched version is strongly recommended.