Vulnerability Description
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in "raw" mode, it can be made to render as HTML if viewed under specific circumstances
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 5.1, < 15.9.6 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.jsonThird Party Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/404613Broken Link
- https://hackerone.com/reports/1923293Permissions Required
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.jsonThird Party Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/404613Broken Link
- https://hackerone.com/reports/1923293Permissions Required
FAQ
What is CVE-2023-1836?
CVE-2023-1836 is a vulnerability with a CVSS score of 4.4 (MEDIUM). A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 bef...
How severe is CVE-2023-1836?
CVE-2023-1836 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1836?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.