First published: Thu Apr 01 2021(Updated: )
Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.6.0<13.6.7 | |
GitLab | >=12.6.0<13.6.7 | |
GitLab | >=13.7.0<13.7.7 | |
GitLab | >=13.7.0<13.7.7 | |
GitLab | >=13.8.0<13.8.4 | |
GitLab | >=13.8.0<13.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22177 has a severity rating that indicates a potential denial of service vulnerability.
To fix CVE-2021-22177, upgrade GitLab CE/EE to the latest version that addresses this vulnerability.
CVE-2021-22177 affects GitLab CE/EE versions from 12.6.0 up to and including 13.8.4.
CVE-2021-22177 allows an attacker to spike server resource utilization, potentially leading to service disruption.
CVE-2021-22177 is considered a remote vulnerability as it can be exploited by an attacker without physical access to the system.