First published: Fri Jan 15 2021(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.4.0<13.5.6 | |
GitLab | >=12.4.0<13.5.6 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.7.0<13.7.2 | |
GitLab | >=13.7.0<13.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26414 is considered to have a medium severity due to its potential for Denial of Service when processing specially crafted input.
To fix CVE-2020-26414, it is recommended to upgrade GitLab to version 13.5.6 or later, or versions 13.6.4 and above.
CVE-2020-26414 affects all GitLab versions starting from 12.4.0 up to 13.5.6 and versions from 13.6.0 up to 13.6.4.
CVE-2020-26414 is a Regular Expression Denial of Service (ReDoS) vulnerability.
Exploiting CVE-2020-26414 requires an attacker to craft a malicious input string that specifically targets the regex implementation.