Lucene search

K
cvelistGitLabCVELIST:CVE-2023-2200
HistoryJul 13, 2023 - 2:02 a.m.

CVE-2023-2200 Improper Control of Resource Identifiers ('Resource Injection') in GitLab

2023-07-1302:02:34
CWE-99
GitLab
www.cve.org
4
cve-2023-2200
gitlab
html injection

CVSS3

4.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

21.4%

An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field.

CNA Affected

[
  {
    "vendor": "GitLab",
    "product": "GitLab",
    "repo": "git://[email protected]:gitlab-org/gitlab.git",
    "versions": [
      {
        "version": "7.14",
        "status": "affected",
        "lessThan": "15.11.10",
        "versionType": "semver"
      },
      {
        "version": "16.0",
        "status": "affected",
        "lessThan": "16.0.6",
        "versionType": "semver"
      },
      {
        "version": "16.1",
        "status": "affected",
        "lessThan": "16.1.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

21.4%