fkie_cve-2018-18643
Vulnerability from fkie_nvd
Published
2019-04-25 21:29
Modified
2024-11-21 03:56
Severity ?
Summary
GitLab CE & EE 11.2 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 have Persistent XSS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | * | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 | |
gitlab | gitlab | 11.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", matchCriteriaId: "C9A82A38-6C58-4A31-A1D5-3BFEAFBBB561", versionEndIncluding: "11.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "B62D1EE9-2102-473B-B4FE-1AC7E0BA766B", versionEndIncluding: "11.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", matchCriteriaId: "1042EE83-B2CE-4D93-9626-D6AD9DFBEB94", versionEndExcluding: "11.3.10", versionStartIncluding: "11.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C5C32AE-87CD-4D3A-ABBF-817C80D4F428", versionEndExcluding: "11.3.10", versionStartIncluding: "11.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", matchCriteriaId: "924582FB-788D-4F9B-83E4-2A4BA0C2B324", versionEndExcluding: "11.4.6", versionStartIncluding: "11.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "8114049D-F534-4B9D-8268-3A78E4FEDCE8", versionEndExcluding: "11.4.6", versionStartIncluding: "11.4.0", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", matchCriteriaId: "C45F8A7E-51C7-4025-A89D-A4988B6129CA", versionEndIncluding: "11.4.9", versionStartIncluding: "11.4.7", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "23FF1E49-4108-4A87-B6DB-24A06EE38FC8", versionEndIncluding: "11.4.9", versionStartIncluding: "11.4.7", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:-:*:*:community:*:*:*", matchCriteriaId: "525B6378-9CAA-4D92-8E93-B721E7849852", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:-:*:*:enterprise:*:*:*", matchCriteriaId: "19C42890-83FC-4954-8F1E-22EDA5E24E47", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc1:*:*:community:*:*:*", matchCriteriaId: "2771AED4-EF3A-4B69-AE53-722F24DEC0F7", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc1:*:*:enterprise:*:*:*", matchCriteriaId: "CF1946E5-A778-4417-BC8A-13F5DF2F17FD", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc10:*:*:community:*:*:*", matchCriteriaId: "901C4CD3-7096-4AD4-AF2B-B7F904F845F1", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc10:*:*:enterprise:*:*:*", matchCriteriaId: "EC0D36DB-200D-45D8-80BB-2EB55367AC2F", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc11:*:*:community:*:*:*", matchCriteriaId: "A2E38E49-90CD-451F-A7DF-19E502F1D4AA", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc11:*:*:enterprise:*:*:*", matchCriteriaId: "B2CA2C1D-B7F3-47A4-83B6-5C5467C9EDC5", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc2:*:*:community:*:*:*", matchCriteriaId: "98AD6AE7-FF89-4E11-AD5E-A6D3D20789CF", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc2:*:*:enterprise:*:*:*", matchCriteriaId: "A3757C6F-2802-4FDE-88BA-E3B6507A107D", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc3:*:*:community:*:*:*", matchCriteriaId: "44EB9698-6CDA-4BE5-8D85-096CC997F55C", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc3:*:*:enterprise:*:*:*", matchCriteriaId: "144EBEE1-625F-4C06-B3CB-9018F6AFABBC", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc4:*:*:community:*:*:*", matchCriteriaId: "531DB1D7-C42F-4E6F-868E-3FF480546E74", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc4:*:*:enterprise:*:*:*", matchCriteriaId: "2037B0C0-9AA7-41C0-9DD8-A6A8464A9DA3", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc5:*:*:community:*:*:*", matchCriteriaId: "576B8B78-2CB7-417A-8AF0-B95446A023B4", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc5:*:*:enterprise:*:*:*", matchCriteriaId: "3F2403AB-0172-4947-A0BA-453B56FFE9D5", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc6:*:*:community:*:*:*", matchCriteriaId: "F9B3A25E-2C28-4DB6-9062-C70E23702EEE", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc6:*:*:enterprise:*:*:*", matchCriteriaId: "51D42658-0268-40D7-9758-C6128C26AFA4", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc7:*:*:community:*:*:*", matchCriteriaId: "3512110A-B085-48DD-9B12-014C6FF52E19", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc7:*:*:enterprise:*:*:*", matchCriteriaId: "5CCBBB31-EA36-408E-A3EA-81B19C022382", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc8:*:*:community:*:*:*", matchCriteriaId: "A7DDE6C4-278B-4EB7-9986-EEDEC7227B2D", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc8:*:*:enterprise:*:*:*", matchCriteriaId: "D056FF6E-A733-430E-9DD2-E1C05745C06E", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc9:*:*:community:*:*:*", matchCriteriaId: "2D479F97-2C00-44C3-88F3-5829DA3D559E", vulnerable: true, }, { criteria: "cpe:2.3:a:gitlab:gitlab:11.5.0:rc9:*:*:enterprise:*:*:*", matchCriteriaId: "1BE4FF0C-CC41-4D99-9174-DEF5025063F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "GitLab CE & EE 11.2 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 have Persistent XSS.", }, { lang: "es", value: "GitLab CE & EE versiones posteriores a 11.2 y anteriores a 11.5.0-rc12, 11.4.6 y 11.3.10 tienen Cross-site scripting (XSS) persistente.", }, ], id: "CVE-2018-18643", lastModified: "2024-11-21T03:56:17.243", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-04-25T21:29:00.230", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://about.gitlab.com/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://about.gitlab.com/blog/categories/releases/", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://gitlab.com/gitlab-org/gitlab-ce/issues/53385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://about.gitlab.com/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://about.gitlab.com/blog/categories/releases/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://gitlab.com/gitlab-org/gitlab-ce/issues/53385", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.