Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From VID-8A4ABA2D-F33E-11E8-9416-001B217B3468:
Gitlab reports:
View Names of Private Groups
Persistent XSS in Environments
SSRF in Prometheus integration
Unauthorized Promotion of Milestones
Exposure of Confidential Issue Title
Persisent XSS in Markdown Fields via Mermaid Script
Persistent XSS in Markdown Fields via Unrecognized HTML Tags
Symlink Race Condition in Pages
Unauthorized Changes by Guest User in Issues
Unauthorized Comments on Locked Issues
Improper Enforcement of Token Scope
CRLF Injection in Project Mirroring
XSS in OAuth Authorization
SSRF in Webhooks
Send Email on Email Address Change
Workhorse Logs Contained Tokens
Unauthorized Publishing of Draft Comments
Guest Can Set Weight of a New Issue
Disclosure of Private Group's Members and Milestones
Persisent XSS in Operations
Reporter Can View Operations Page
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center