First published: Mon Oct 04 2021(Updated: )
A vulnerability was discovered in GitLab starting with version 12.2 that allows an attacker to cause uncontrolled resource consumption with a specially crafted file.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.2.0<14.1.7 | |
GitLab | >=12.2.0<14.1.7 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.2<14.2.5 | |
GitLab | >=14.3<14.3.1 | |
GitLab | >=14.3<14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39877 has been rated as a high severity vulnerability due to its potential for causing uncontrolled resource consumption.
To mitigate CVE-2021-39877, upgrade your GitLab installation to version 14.1.7 or later, or 14.2.5 or later.
CVE-2021-39877 affects GitLab versions starting from 12.2.0 up to 14.1.7 and those in the 14.2.x stream before 14.2.5.
CVE-2021-39877 allows attackers to exploit controlled resource consumption, potentially leading to service disruption.
Yes, CVE-2021-39877 affects both the Community and Enterprise editions of GitLab.