First published: Fri Dec 11 2020(Updated: )
A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.3.0<13.4.7 | |
GitLab | >=10.3.0<13.4.7 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.6.0<13.6.2 | |
GitLab | >=13.6.0<13.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26409 is classified as a denial-of-service (DoS) vulnerability.
CVE-2020-26409 affects GitLab CE/EE versions from 10.3 to 13.4.7, 13.5 to 13.5.5, and 13.6 to 13.6.2.
To address CVE-2020-26409, upgrade your GitLab instance to the latest version beyond 13.4.7, 13.5.5, or 13.6.2.
CVE-2020-26409 allows attackers to trigger uncontrolled resource consumption through input validation bypass in markdown fields.
You can verify your GitLab version against the affected versions listed under CVE-2020-26409.