GMS-2023-6515: Maloja error page XSS vulnerability
Impact
The error page for a missing path echoes the path back to the user. If this contains HTML, an attacker could execute a script on the user’s machine inside the Maloja context and perform authorized actions like scrobbling or deleting scrobbles. This does not affect the security of your server. The exploit is purely client-side. Since there is very little incentive to mess with your scrobble data and it requires very specific targeting (an attacker would have to send a user a link to their own server), the severity rating might be misleading.
Patches
The Vulnerability is patched in 3.2.2
References
Detect and mitigate GMS-2023-6515 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →