CVE-2020-13333

A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:enterprise:*:*:*

History

No history.

Information

Published : 2020-10-06 19:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-13333

Mitre link : CVE-2020-13333

CVE.ORG link : CVE-2020-13333


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-400

Uncontrolled Resource Consumption