First published: Wed Apr 05 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 15.6 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. An XSS was possible via a malicious email address for certain instances.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.6.0<15.8.5 | |
GitLab | >=15.6.0<=15.8.5 | |
GitLab | >=15.9.0<15.9.4 | |
GitLab | >=15.9.0<15.9.4 | |
GitLab | =15.10.0 | |
GitLab | =15.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0523 has been classified as a medium severity vulnerability due to its potential for XSS exploitation.
To fix CVE-2023-0523, update your GitLab installation to version 15.8.5, 15.9.4, or 15.10.1 or later.
CVE-2023-0523 affects all GitLab versions from 15.6 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1.
CVE-2023-0523 is an XSS (Cross-Site Scripting) vulnerability related to handling malicious email addresses.
An attacker could exploit CVE-2023-0523 to execute arbitrary scripts in the context of a victim's session.