First published: Fri Aug 05 2022(Updated: )
A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions before 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1. A stored XSS flaw in job error messages allows attackers to perform arbitrary actions on behalf of victims at client side.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.0.5 | |
GitLab | >=15.1.0<15.1.4 | |
GitLab | =15.2 | |
GitLab | <15.0.5 | |
GitLab | >=15.1.0<15.1.4 | |
GitLab | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2500 is classified as a moderate severity vulnerability due to the potential for cross-site scripting attacks.
To mitigate CVE-2022-2500, upgrade GitLab CE/EE to versions 15.0.5, 15.1.4, or 15.2.1 or later.
CVE-2022-2500 affects all GitLab CE/EE versions before 15.0.5, 15.1 before 15.1.4, and 15.2 before 15.2.1.
CVE-2022-2500 enables attackers to perform stored cross-site scripting (XSS) attacks via job error messages.
CVE-2022-2500 is a client-side vulnerability allowing attackers to execute arbitrary actions on victims' browsers.