Undergoing Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
CVE has been recently published to the CVE List and has been received by the NVD.
Products
GitLab CE/EE
- 9.2 - 16.11.5
- 17.0 - 17.0.3
- 17.1 - 17.1.1
Source
cve@gitlab.com
Tags
CVE-2024-1493 details
Published : June 27, 2024, 12:15 a.m.
Last Modified : June 27, 2024, 12:47 p.m.
Last Modified : June 27, 2024, 12:47 p.m.
Description
An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular expression DoS attack on the server
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.5 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-400 | Uncontrolled Resource Consumption | The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
6.5
Exploitability Score
2.8
Impact Score
3.6
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References
URL | Source |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/441806 | cve@gitlab.com |
https://hackerone.com/reports/2370084 | cve@gitlab.com |
This website uses the NVD API, but is not approved or certified by it.