CVE-2022-31267: Unescaped control characters in Gitblit
(updated )
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext ‘attacker@example.com\n\trole = “#admin”’ value.
References
Detect and mitigate CVE-2022-31267 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →