Files
CVEs-PoC/2021/CVE-2021-22225.md
2025-09-29 21:09:30 +02:00

20 lines
1019 B
Markdown

### [CVE-2021-22225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22225)
![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.11.3%2C%20%3C13.11.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D13.12%2C%20%3C13.12.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D14.0%2C%20%3C14.0.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20('cross-site%20scripting')%20in%20GitLab&color=brightgreen)
### Description
Insufficient input sanitization in markdown in GitLab version 13.11 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown
### POC
#### Reference
- https://gitlab.com/gitlab-org/gitlab/-/issues/331051
#### Github
- https://github.com/cokeBeer/goot