Vulnerability Description
A stored Cross-Site Scripting vulnerability in the Jira integration in all GitLab versions starting from 13.9 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious Jira API responses
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 13.9.0, < 14.0.9 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22261.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/328389Broken Link
- https://hackerone.com/reports/1132083Permissions RequiredThird Party Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22261.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/328389Broken Link
- https://hackerone.com/reports/1132083Permissions RequiredThird Party Advisory
FAQ
What is CVE-2021-22261?
CVE-2021-22261 is a vulnerability with a CVSS score of 7.3 (HIGH). A stored Cross-Site Scripting vulnerability in the Jira integration in all GitLab versions starting from 13.9 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting fr...
How severe is CVE-2021-22261?
CVE-2021-22261 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-22261?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.