CVE-2023-32766: Gitpod vulnerable to Cross-site Scripting
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.344%
CWE
Published
6/5/2023
Updated
11/9/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/gitpod-io/gitpod | go | < 2022.11.3 | 2022.11.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper protocol validation in the redirect logic. The pre-patch code in service.tsx checked if the protocol was NOT http/https to allow redirects, which inadvertently permitted XSS vectors. The patch introduced a strict allowlist (vscode:, vscode-insiders:, jetbrains-gateway:), confirming the original vulnerability existed in this protocol check function. The code modification directly addresses the XSS vulnerability by restricting allowed protocols.