An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3573.json | Vendor Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/378216 | Broken Link |
https://hackerone.com/reports/1730461 | Permissions Required Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitLab
Published: 2023-01-12T00:00:00
Updated: 2023-01-12T00:00:00
Reserved: 2022-10-17T00:00:00
Link: CVE-2022-3573
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-01-12T04:15:08.803
Modified: 2023-03-22T16:19:06.077
Link: CVE-2022-3573
JSON object: View
Redhat Information
No data.
CWE