CVE-2022-1174

A potential DoS vulnerability was discovered in Gitlab CE/EE versions 13.7 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to trigger high CPU usage via a special crafted input added in Issues, Merge requests, Milestones, Snippets, Wiki pages, etc.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-400 CWE-1284

Information

Published : 2022-04-04 20:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-1174

Mitre link : CVE-2022-1174

CVE.ORG link : CVE-2022-1174


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
CWE-1284

Improper Validation of Specified Quantity in Input