First published: Fri Dec 20 2019(Updated: )
A denial of service exists in gitlab <v12.3.2, <v12.2.6, and <v12.1.10 that would let an attacker bypass input validation in markdown fields take down the affected page.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <12.1.10 | |
GitLab | <12.1.10 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.2.0<12.2.6 | |
GitLab | >=12.3.0<12.3.2 | |
GitLab | >=12.3.0<12.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15584 is classified as a denial of service vulnerability that can significantly impact the performance of affected GitLab instances.
To fix CVE-2019-15584, you should upgrade your GitLab software to the latest version beyond 12.3.2, 12.2.6, or 12.1.10.
CVE-2019-15584 affects GitLab versions prior to 12.3.2, 12.2.6, and 12.1.10 for both community and enterprise editions.
CVE-2019-15584 is associated with a denial of service (DoS) attack that exploits input validation issues in markdown fields.
Yes, an attacker can exploit CVE-2019-15584 remotely by bypassing input validation and causing the affected page to become unresponsive.