{"id":279,"date":"2021-01-15T00:52:41","date_gmt":"2021-01-14T19:22:41","guid":{"rendered":"https:\/\/ganofins.com\/blog\/?p=279"},"modified":"2021-01-15T00:59:02","modified_gmt":"2021-01-14T19:29:02","slug":"cve-2019-15739","status":"publish","type":"post","link":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/","title":{"rendered":"CVE-2019-15739"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Description:<\/h2>\n\n\n\n<p>An issue was discovered in <strong>GitLab<\/strong> Community and Enterprise Edition 8.1 through 12.2.1. Certain areas displaying Markdown were not properly sanitizing some XSS payloads.<br>Gitlab issue descriptions and other areas that accept markdown like .md files in repositories are vulnerable to cross-site scripting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Impact:<\/h2>\n\n\n\n<p>An attacker can run any arbitrary Javascript code in the victim&#8217;s browser<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CVSS Score:<\/h2>\n\n\n\n<p><strong>6.1<\/strong> (CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exploit:<\/h2>\n\n\n\n<p><code>&lt;style&gt;&lt;img src=\"o.O\" onerror=alert(`document.domain`)&gt; &lt;iframe\/%0<\/code><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References\/Sources:<\/h2>\n\n\n\n<p><a href=\"https:\/\/gist.github.com\/mortenson\/55c60006e336c3c4327d62365fcf04d4\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/gist.github.com\/mortenson\/55c60006e336c3c4327d62365fcf04d4<\/a><br><a href=\"https:\/\/gitlab.com\/gitlab-org\/gitlab-foss\/-\/issues\/64033\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/gitlab.com\/gitlab-org\/gitlab-foss\/-\/issues\/64033<\/a><br><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-15739\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-15739<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. Certain areas displaying Markdown were not properly sanitizing some XSS payloads.Gitlab issue descriptions and other areas that accept markdown like .md files in repositories are vulnerable&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[51,50],"tags":[53,52,57,13,29,58,54,56,55],"class_list":["post-279","post","type-post","status-publish","format-standard","hentry","category-cve","category-exploits","tag-cve","tag-exploit","tag-exploits-by-ganofins","tag-ganofins","tag-ganofins-blog","tag-ganofins-exploits","tag-gitlab-exploit","tag-gitlab-instance-exploit","tag-gitlab-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE-2019-15739 - Ganofins Blog<\/title>\n<meta name=\"description\" content=\"An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. An attacker can run arbitrary Javascript code\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2019-15739 - Ganofins Blog\" \/>\n<meta property=\"og:description\" content=\"An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. An attacker can run arbitrary Javascript code\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\" \/>\n<meta property=\"og:site_name\" content=\"Ganofins Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-14T19:22:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-14T19:29:02+00:00\" \/>\n<meta name=\"author\" content=\"ganofins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ganofins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\"},\"author\":{\"name\":\"ganofins\",\"@id\":\"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db\"},\"headline\":\"CVE-2019-15739\",\"datePublished\":\"2021-01-14T19:22:41+00:00\",\"dateModified\":\"2021-01-14T19:29:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\"},\"wordCount\":106,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db\"},\"keywords\":[\"cve\",\"exploit\",\"exploits by ganofins\",\"ganofins\",\"ganofins blog\",\"ganofins exploits\",\"gitlab exploit\",\"gitlab instance exploit\",\"gitlab vulnerability\"],\"articleSection\":[\"CVE\",\"Exploits\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\",\"url\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\",\"name\":\"CVE-2019-15739 - Ganofins Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ganofins.com\/blog\/#website\"},\"datePublished\":\"2021-01-14T19:22:41+00:00\",\"dateModified\":\"2021-01-14T19:29:02+00:00\",\"description\":\"An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. An attacker can run arbitrary Javascript code\",\"breadcrumb\":{\"@id\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ganofins.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2019-15739\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ganofins.com\/blog\/#website\",\"url\":\"https:\/\/ganofins.com\/blog\/\",\"name\":\"Ganofins Blog\",\"description\":\"Learn Today Apply Today\",\"publisher\":{\"@id\":\"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ganofins.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db\",\"name\":\"ganofins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ganofins.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ganofins.com\/blog\/wp-content\/litespeed\/avatar\/a1fd68d9e27b63b4007d850d5d958b59.jpg?ver=1776081109\",\"contentUrl\":\"https:\/\/ganofins.com\/blog\/wp-content\/litespeed\/avatar\/a1fd68d9e27b63b4007d850d5d958b59.jpg?ver=1776081109\",\"caption\":\"ganofins\"},\"logo\":{\"@id\":\"https:\/\/ganofins.com\/blog\/#\/schema\/person\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2019-15739 - Ganofins Blog","description":"An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. An attacker can run arbitrary Javascript code","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2019-15739 - Ganofins Blog","og_description":"An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. An attacker can run arbitrary Javascript code","og_url":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/","og_site_name":"Ganofins Blog","article_published_time":"2021-01-14T19:22:41+00:00","article_modified_time":"2021-01-14T19:29:02+00:00","author":"ganofins","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ganofins","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#article","isPartOf":{"@id":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/"},"author":{"name":"ganofins","@id":"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db"},"headline":"CVE-2019-15739","datePublished":"2021-01-14T19:22:41+00:00","dateModified":"2021-01-14T19:29:02+00:00","mainEntityOfPage":{"@id":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/"},"wordCount":106,"commentCount":0,"publisher":{"@id":"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db"},"keywords":["cve","exploit","exploits by ganofins","ganofins","ganofins blog","ganofins exploits","gitlab exploit","gitlab instance exploit","gitlab vulnerability"],"articleSection":["CVE","Exploits"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ganofins.com\/blog\/cve-2019-15739\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/","url":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/","name":"CVE-2019-15739 - Ganofins Blog","isPartOf":{"@id":"https:\/\/ganofins.com\/blog\/#website"},"datePublished":"2021-01-14T19:22:41+00:00","dateModified":"2021-01-14T19:29:02+00:00","description":"An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. An attacker can run arbitrary Javascript code","breadcrumb":{"@id":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ganofins.com\/blog\/cve-2019-15739\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ganofins.com\/blog\/cve-2019-15739\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ganofins.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CVE-2019-15739"}]},{"@type":"WebSite","@id":"https:\/\/ganofins.com\/blog\/#website","url":"https:\/\/ganofins.com\/blog\/","name":"Ganofins Blog","description":"Learn Today Apply Today","publisher":{"@id":"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ganofins.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/ganofins.com\/blog\/#\/schema\/person\/ce75d64682bcbf85acac97c9cb93a8db","name":"ganofins","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ganofins.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ganofins.com\/blog\/wp-content\/litespeed\/avatar\/a1fd68d9e27b63b4007d850d5d958b59.jpg?ver=1776081109","contentUrl":"https:\/\/ganofins.com\/blog\/wp-content\/litespeed\/avatar\/a1fd68d9e27b63b4007d850d5d958b59.jpg?ver=1776081109","caption":"ganofins"},"logo":{"@id":"https:\/\/ganofins.com\/blog\/#\/schema\/person\/image\/"}}]}},"amp_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/posts\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":7,"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/posts\/279\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ganofins.com\/blog\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}