First published: Fri Jul 01 2022(Updated: )
A Stored Cross-Site Scripting vulnerability in the project settings page in GitLab CE/EE affecting all versions from 14.4 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.4.0<14.10.5 | |
GitLab | >=14.4.0<14.10.5 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | =15.1.0 | |
GitLab | =15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2230 is classified as a Stored Cross-Site Scripting vulnerability that could lead to arbitrary JavaScript execution in GitLab.
To resolve CVE-2022-2230, update GitLab to version 14.10.5 or later, or version 15.0.4 or later.
CVE-2022-2230 affects GitLab versions from 14.4 before 14.10.5, 15.0 before 15.0.4, and the exact version 15.1.0.
Yes, CVE-2022-2230 can be exploited remotely by an attacker through the project settings page in GitLab.
CVE-2022-2230 is a Stored Cross-Site Scripting vulnerability that allows execution of arbitrary scripts in user sessions.