First published: Wed May 03 2023(Updated: )
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in "raw" mode, it can be made to render as HTML if viewed under specific circumstances
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=5.1<15.9.6 | |
GitLab | >=15.10<15.10.5 | |
GitLab | >=15.11<15.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1836 has been classified as a medium severity vulnerability due to its potential impact on user data.
CVE-2023-1836 allows attackers to exploit cross-site scripting when viewing XML files in raw mode, potentially leading to unauthorized script execution.
To fix CVE-2023-1836, update your GitLab instance to version 15.9.6, 15.10.5, or 15.11.1 or later.
CVE-2023-1836 affects GitLab versions from 5.1 before 15.9.6, from 15.10 before 15.10.5, and from 15.11 before 15.11.1.
Mitigation steps include limiting access to raw XML file viewing for untrusted users until the software is updated.