An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3573.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/378216 | Broken Link |
https://hackerone.com/reports/1730461 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2023-01-12 04:15
Updated : 2023-03-22 16:19
NVD link : CVE-2022-3573
Mitre link : CVE-2022-3573
CVE.ORG link : CVE-2022-3573
JSON object : View
Products Affected
gitlab
- gitlab
abb
- drive_composer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')