First published: Fri Dec 01 2023(Updated: )
Improper neutralization of input in Jira integration configuration in GitLab CE/EE, affecting all versions from 15.10 prior to 16.6.1, 16.5 prior to 16.5.3, and 16.4 prior to 16.4.3 allows attacker to execute javascript in victim's browser.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.10<16.6.1 | |
GitLab | >=15.10<16.6.1 | |
GitLab | >=16.4.0<16.4.3 | |
GitLab | >=16.4.0<16.4.3 | |
GitLab | >=16.5.0<16.5.3 | |
GitLab | >=16.5.0<16.5.3 |
Upgrade to versions 16.6.1, 16.5.3, 16.4.3 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6033 is a vulnerability in GitLab that allows an attacker to execute JavaScript in a victim's browser through improper neutralization of input in Jira integration configuration.
GitLab versions 15.10 to 16.6.1, 16.5 to 16.5.3, and 16.4 to 16.4.3 are affected by CVE-2023-6033.
CVE-2023-6033 has a severity rating of 8.7 (High).
To fix CVE-2023-6033, it is recommended to update GitLab to version 16.6.1, 16.5.3, or 16.4.3, depending on the affected version.
More information about CVE-2023-6033 can be found in the GitLab issue #431201 and the associated HackerOne report.