CVE-2020-13333Uncontrolled Resource Consumption in Gitlab

Severity
4.3MEDIUMNVD
EPSS
0.2%
top 64.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 6
Latest updateMay 24

Description

A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

debiandebian/gitlab< gitlab 13.2.10-1 (sid)
CVEListV5gitlab/gitlab>=13.1, <13.2.10, >=13.3.0, <13.3.7, >=13.4.0, <13.4.2+2
NVDgitlab/gitlab13.1.0, 13.2.0, 13.3.0+2
gitlabgitlab/gitlab

🔴Vulnerability Details

2
GHSA
GHSA-8h2p-m6f9-v8r7: A potential DOS vulnerability was discovered in GitLab versions 132022-05-24
OSV
CVE-2020-13333: A potential DOS vulnerability was discovered in GitLab versions 132020-10-06

📋Vendor Advisories

2
GitLab
CVE-2020-13333: A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex c2020-10-06
Debian
CVE-2020-13333: gitlab - A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 1...2020