
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-1175 is a Cross-Site Scripting (XSS) vulnerability discovered in GitLab CE/EE that affects versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, and all versions starting from 14.9 before 14.9.2. The vulnerability stems from improper neutralization of user input that allowed attackers to exploit XSS by injecting HTML in notes (GitLab CVE, Debian Tracker).
The vulnerability allows attackers to perform HTML injection in notes through improper input validation. The issue was particularly severe as it could be exploited through the syntaxhighlightfilter.rb component, allowing for HTML injection in any Markdown content, including wiki pages and issue descriptions. The vulnerability could be weaponized through multiple vectors, with the most critical being the ability to inject script tags (PacketStorm).
The vulnerability enables stored Cross-Site Scripting attacks, which could allow attackers to create tokens and potentially take over SSO accounts. The stored nature of the XSS makes it particularly dangerous as the malicious payload persists on the server and can affect multiple users (GitLab Issue).
The vulnerability has been patched in GitLab versions 14.7.7, 14.8.5, and 14.9.2. Organizations should upgrade to these or newer versions to protect against this vulnerability. The fix includes improved input validation and sanitization mechanisms for user-supplied content (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."