First published: Mon Dec 13 2021(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.2.0<14.3.6 | |
GitLab | >=13.2.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39940 has been classified as a medium severity vulnerability.
To mitigate CVE-2021-39940, upgrade GitLab to version 14.3.6 or later, 14.4.4 or later, or 14.5.2 or later.
CVE-2021-39940 affects GitLab CE/EE versions between 13.2.0 and 14.3.6, 14.4.0 and 14.4.4, and 14.5.0 and 14.5.2.
CVE-2021-39940 allows for a regular expression denial of service attack.
No, CVE-2021-39940 is only present in specific versions of GitLab prior to the patched releases.