4.3
CVSSv2

CVE-2022-1175

Published: 04/04/2022 Updated: 10/05/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Improper neutralization of user input in GitLab CE/EE versions 14.4 prior to 14.7.7, all versions starting from 14.8 prior to 14.8.5, all versions starting from 14.9 prior to 14.9.2 allowed an malicious user to exploit XSS by injecting HTML in notes.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitlab gitlab

Exploits

Gitlab versions 149 prior to 1492, 148 prior to 1485, and 147 prior to 1477 suffer from a persistent cross site scripting vulnerability ...

Github Repositories

CVE-2022-1175 Gitlab Stored XSS, can be set in an issue on a project, either your own or another users Allows attacks such as creating & stealing a Personal Access Token (PAT) of anyone who visits an issue PAT's can then provide full Gitlab API access as that user equivilent to a full account takeover Can be abused by changing the base of the project to your sit

Recent Articles

GitLab issues critical update after hard-coding passwords into accounts
The Register • Thomas Claburn in San Francisco • 01 Jan 1970

Get our weekly newsletter Fixed passphrases for OmniAuth users not such a great idea

GitLab on Thursday issued security updates for three versions of GitLab Community Edition (CE) and Enterprise Edition (EE) software that address, among other flaws, a critical hard-coded password bug. The cloud-hosted software version control service released versions 14.9.2, 14.8.5, and 14.7.7 of its self-hosted CE and EE software, fixing one "critical" security vulnerability (CVE-2022-1162), as well as two rated "high," nine rated "medium," and four rated "low." "A hard-coded password was set ...