First published: Fri Dec 11 2020(Updated: )
A potential DOS vulnerability was discovered in all versions of Gitlab starting from 13.4.x (>=13.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2). Using a specific query name for a project search can cause statement timeouts that can lead to a potential DOS if abused.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.4.0<13.4.7 | |
GitLab | >=13.5.0<13.5.5 | |
GitLab | >=13.6.0<13.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26411 is classified as a potential denial-of-service (DOS) vulnerability.
To remediate CVE-2020-26411, upgrade GitLab to versions 13.4.7, 13.5.5, or 13.6.2 or later.
CVE-2020-26411 affects GitLab versions from 13.4.0 to 13.4.6, from 13.5.0 to 13.5.4, and from 13.6.0 to 13.6.1.
The DOS is triggered by using a specific project search query that can cause statement timeouts.
CVE-2020-26411 is not present in GitLab versions published after 13.6.2.