CVE-2022-1948

An issue has been discovered in GitLab affecting all versions starting from 15.0 before 15.0.1. Missing validation of input used in quick actions allowed an attacker to exploit XSS by injecting HTML in contact details.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:15.0.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:15.0.0:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 8.7
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1948.json - Vendor Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1948.json - Vendor Advisory
References () https://gitlab.com/gitlab-org/security/gitlab/-/issues/673 - Permissions Required () https://gitlab.com/gitlab-org/security/gitlab/-/issues/673 - Permissions Required
References () https://hackerone.com/reports/1578400 - Permissions Required () https://hackerone.com/reports/1578400 - Permissions Required

Information

Published : 2022-07-28 15:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1948

Mitre link : CVE-2022-1948

CVE.ORG link : CVE-2022-1948


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')