First published: Mon Dec 13 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Using large payloads, the diff feature could be used to trigger high load time for users reviewing code changes.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.0.0<14.3.6 | |
GitLab | >=11.0.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39932 is considered a moderate severity vulnerability due to its potential to cause high load times when large payloads are used.
To mitigate CVE-2021-39932, upgrade to GitLab versions 14.3.6, 14.4.4, or 14.5.2 or later.
CVE-2021-39932 affects all GitLab CE/EE versions from 11.0 to 14.3.6, from 14.4 to 14.4.4, and from 14.5 to 14.5.2.
The diff feature in GitLab is specifically impacted by CVE-2021-39932, causing performance issues with large payloads.
CVE-2021-39932 can be exploited locally by users reviewing code, affecting their performance during code reviews.