First published: Fri Jan 15 2021(Updated: )
A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<13.5.6 | |
GitLab | >=12.8.0<13.5.6 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.6.0<13.6.4 | |
GitLab | >=13.7.0<13.7.2 | |
GitLab | >=13.7.0<13.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22168 has been classified as a denial of service vulnerability with medium severity.
To mitigate CVE-2021-22168, upgrade GitLab to version 13.5.7 or later for supported versions.
CVE-2021-22168 affects all versions of GitLab from 12.8.0 to 13.7.2, except those that have been patched.
CVE-2021-22168 allows attackers to exploit a regular expression denial of service, potentially overwhelming the service.
There are no documented workarounds for CVE-2021-22168; the recommended action is to upgrade to a secure version.