CVE-2023-2200

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Jul 13, 2023 / Updated: 16mo ago

010
CVSS 5.4EPSS 0.04%Medium
CVE info copied to clipboard

An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2023-2200. See article

Jun 29, 2023 at 5:12 PM / about.gitlab.com
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (379584)

Apr 4, 2024 at 12:00 AM
Static CVE Timeline Graph

Affected Systems

Gitlab/gitlab
+null more

Patches

gitlab.com
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

References

GitLab Security Release: 16.1.1, 16.0.6, and 15.11.10
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to merge arbitrary code into protected branches due to a CODEOWNERS approval bug. An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field.

News

Vulnerability Summary for the Week of July 10, 2023 | CISA
microsoft — windows_10 Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents. An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. Please see the Microsoft Threat Intelligence Blog https://aka.ms/Storm-0978 Entry for important information about steps you can take to protect your system from this vulnerability. This CVE will be updated with new information and links to security updates when they become available. 2023-07-11 not yet calculated CVE-2023-36884 MISC dynacase — webdesk A vulnerability was found in Dynacase Webdesk and classified as critical. Affected by this issue is the function freedomrss_search of the file freedomrss_search.php.
NA - CVE-2023-2200 - An issue has been discovered in GitLab CE/EE...
An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1,...
CVE-2023-2200 | GitLab Community Edition/Enterprise Edition email address cross site scripting (Issue 408281)
A vulnerability was found in GitLab Community Edition and Enterprise Edition . It has been declared as problematic . Affected by this vulnerability is an unknown functionality. The manipulation of the argument email address leads to basic cross site scripting. This vulnerability is known as CVE-2023-2200 . The attack can be launched remotely. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2023-2200
Severity Not Scored Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field. Read more at https://www.tenable.com/cve/CVE-2023-2200
CVE-2023-2200
We have provided these links to other web sites because they An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field.
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI