First published: Thu Nov 04 2021(Updated: )
A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0 could cause excessive usage of resources when a specially crafted username was used when provisioning a new user
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.13.0<14.2.6 | |
GitLab | >=8.13.0<14.2.6 | |
GitLab | >=14.3.0<14.3.4 | |
GitLab | >=14.3.0<14.3.4 | |
GitLab | =14.4.0 | |
GitLab | =14.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39914 is classified as a denial of service vulnerability that can lead to excessive resource usage in affected GitLab versions.
To fix CVE-2021-39914, upgrade GitLab to version 14.2.6 or later, 14.3.4 or later, or ensure you are using a version higher than 14.4.0.
CVE-2021-39914 affects GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3, and 14.4.0.
If you have CVE-2021-39914, attackers can exploit the vulnerability by using specially crafted usernames, leading to resource exhaustion.
You can identify if your GitLab instance is vulnerable to CVE-2021-39914 by checking its version against the affected versions listed.