When displaying a git commit message that contains HTML tags, GitLab does not HTML escape them.
The commit message being displayed as HTML, any page that lists the commits is thus subject to javascript injection.
git commit -m '<script type="text/javascript">alert("Here we go...");</script>'
Designs
Child items
...
Show closed items
Linked items
0
Link issues together to show that they're related or that one is blocking others.
Learn more.
seems it's not possible to do XSS, because somewhere <script> tags are stripped, but HTML isn't escaped so that's not proper solution, for example if I make such commit: added big <h1>title</h1>
By Administrator on 2012-09-19T21:04:45 (imported from GitLab)