First published: Fri Jul 01 2022(Updated: )
Insufficient sanitization in GitLab EE's external issue tracker affecting all versions from 14.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTao link
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.5.0<14.10.5 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | =15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2235 has been classified with a high severity rating due to the potential for cross-site scripting attacks.
To mitigate CVE-2022-2235, upgrade your GitLab EE instance to version 14.10.5 or later, or to version 15.0.4 or later.
CVE-2022-2235 affects all versions of GitLab EE from 14.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1.
CVE-2022-2235 can lead to cross-site scripting attacks, allowing attackers to execute arbitrary scripts in the context of the victim's browser.
Exploitation of CVE-2022-2235 may result in unauthorized information disclosure, session hijacking, or other malicious actions on behalf of the user.