First published: Thu Mar 28 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 16.8.5, all versions starting from 16.9 before 16.9.3, all versions starting from 16.10 before 16.10.1. A wiki page with a crafted payload may lead to a Stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.8.5 | |
GitLab | <16.8.5 | |
GitLab | >=16.9.0<16.9.3 | |
GitLab | >=16.9.0<16.9.3 | |
GitLab | =16.10.0 | |
GitLab | =16.10.0 |
Upgrade to versions 16.10.1, 16.9.3, 16.8.5 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6371 has been classified with a high severity due to the potential for stored XSS attacks.
To fix CVE-2023-6371, upgrade GitLab to version 16.8.5 or to version 16.9.3 or later for the 16.9 and 16.10 branches.
All versions of GitLab before 16.8.5 and versions starting from 16.9 before 16.9.3, as well as 16.10 before 16.10.1 are affected by CVE-2023-6371.
Yes, CVE-2023-6371 can allow attackers to perform arbitrary actions through a crafted payload due to stored XSS vulnerabilities.
Yes, CVE-2023-6371 affects both GitLab Community Edition (CE) and Enterprise Edition (EE) versions.