First published: Thu Jan 12 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=15.4.0<15.5.7 | |
GitLab GitLab | >=15.4.0<15.5.7 | |
GitLab GitLab | >=15.6.0<15.6.4 | |
GitLab GitLab | >=15.6.0<15.6.4 | |
GitLab GitLab | >=15.7.0<15.7.2 | |
GitLab GitLab | >=15.7.0<15.7.2 | |
Abb Drive Composer | <=2.8 | |
Abb Drive Composer | <=2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3573 is an issue discovered in GitLab CE/EE that affects all versions starting from 15.4 before 15.5.7, 15.6 before 15.6.4, and 15.7 before 15.7.2.
The severity of CVE-2022-3573 is medium with a CVSS score of 5.4.
CVE-2022-3573 affects GitLab CE/EE by allowing an attacker to execute arbitrary code due to improper filtering of query parameters in the wiki changes page.
All versions starting from 15.4 before 15.5.7, 15.6 before 15.6.4, and 15.7 before 15.7.2 of GitLab CE/EE are affected by CVE-2022-3573.
To fix CVE-2022-3573 in GitLab CE/EE, upgrade to version 15.5.7, 15.6.4, or 15.7.2 or later.