{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-1948", "ASSIGNER": "cve@gitlab.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "GitLab", "product": { "product_data": [ { "product_name": "GitLab", "version": { "version_data": [ { "version_value": ">=15.0.0, <15.0.1" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper neutralization of input during web page generation ('cross-site scripting') in GitLab" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.com/gitlab-org/security/gitlab/-/issues/673", "url": "https://gitlab.com/gitlab-org/security/gitlab/-/issues/673", "refsource": "MISC" }, { "name": "https://hackerone.com/reports/1578400", "url": "https://hackerone.com/reports/1578400", "refsource": "MISC" }, { "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1948.json", "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1948.json", "refsource": "CONFIRM" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "An issue has been discovered in GitLab affecting all versions starting from 15.0 before 15.0.1. Missing validation of input used in quick actions allowed an attacker to exploit XSS by injecting HTML in contact details." } ] }, "impact": { "cvss": { "vectorString": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "version": "3.1", "baseScore": 8.7, "baseSeverity": "HIGH" } }, "credit": [ { "lang": "eng", "value": "Thanks cryptopone(https://hackerone.com/cryptopone) for reporting this vulnerability through our HackerOne bug bounty program" } ] }