A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13333.json | Third Party Advisory |
https://gitlab.com/gitlab-org/gitlab/-/issues/218753 | Broken Link |
https://hackerone.com/reports/870820 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitLab
Published: 2020-10-06T18:30:03
Updated: 2020-10-06T18:30:03
Reserved: 2020-05-21T00:00:00
Link: CVE-2020-13333
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-10-06T19:15:13.257
Modified: 2020-10-29T20:15:48.197
Link: CVE-2020-13333
JSON object: View
Redhat Information
No data.
CWE