GitLab 邮件地址字段存在XSS漏洞(CVE-2023-2200)
CVE编号
CVE-2023-2200利用情况
暂无补丁情况
N/A披露时间
2023-07-13漏洞描述
GitLab 是一个开源的代码托管平台。 GitLab 受影响版本中,攻击者可在电子邮件地址字段中注入恶意的 HTML 代码。解决建议
"将组件 GitLab CE/EE 升级至 16.0.6 及以上版本""将组件 GitLab CE/EE 升级至 16.1.1 及以上版本""将组件 GitLab CE/EE 升级至 15.11.10 及以上版本"
参考链接 |
|
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/408281 | |
https://hackerone.com/reports/1935628 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | gitlab | gitlab | * | From (including) 16.0.0 | Up to (excluding) 16.0.6 | ||||
运行在以下环境 | |||||||||
应用 | gitlab | gitlab | * | From (including) 16.1.0 | Up to (excluding) 16.1.1 | ||||
运行在以下环境 | |||||||||
应用 | gitlab | gitlab | * | From (including) 7.14.0 | Up to (excluding) 15.11.10 | ||||
运行在以下环境 | |||||||||
系统 | amazon_2 | java-17-amazon-corretto | * | Up to (excluding) 11.0.20+8-1.amzn2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | java-17-amazon-corretto | * | Up to (excluding) 11.0.20+8-1.amzn2023 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | gitlab | * | Up to (excluding) 15.11.11+ds1-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | community-mysql-errmsg | * | Up to (excluding) 8.0.34-2.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37_Modular | mysql | * | Up to (excluding) 8.0-3720230907003352.9e842022 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | community-mysql-errmsg | * | Up to (excluding) 8.0.34-2.fc38 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38_Modular | mysql | * | Up to (excluding) 8.0-3820230907003352.75741a8b | |||||
运行在以下环境 | |||||||||
系统 | fedora_39 | community-mysql-errmsg | * | Up to (excluding) 8.0.34-2.fc39 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | java-11-openjdk | * | Up to (excluding) 11.0.20.0.8-1.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | java-11-openjdk | * | Up to (excluding) 11.0.20.0.8-1.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | java-1_8_0-ibm-plugin | * | Up to (excluding) 7.0.8-lp154.2.32.2 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.5 | java-1_8_0-ibm-plugin | * | Up to (excluding) 1.8.0_sr8.10-150000.3.80.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 11.0.20.0.8-1.0.1.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 17.0.8.0.7-2.0.1.el8 | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 11.0.20.0.8-2.0.1.el9 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | java-1_8_0-ibm-alsa | * | Up to (excluding) 1.8.0_sr8.10-30.114.1 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-79 | 在Web页面生成时对输入的转义处理不恰当(跨站脚本) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论