First published: Mon Mar 28 2022(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting with version 8.10. It was possible to trigger a timeout on a page with markdown by using a specific amount of block-quotes.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.10<=14.5.4 | |
GitLab | >=8.10<=14.5.4 | |
GitLab | >=14.6<=14.6.4 | |
GitLab | >=14.6<=14.6.4 | |
GitLab | >=14.7<=14.7.1 | |
GitLab | >=14.7<=14.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0488 is considered a moderate severity vulnerability due to its potential to create service disruptions.
To fix CVE-2022-0488, users should upgrade their GitLab instances to version 14.5.5 or later.
CVE-2022-0488 affects all versions of GitLab CE/EE starting from version 8.10 up to 14.5.4, as well as specific versions within 14.6 and 14.7.
CVE-2022-0488 is a denial-of-service vulnerability that can be triggered by excessive markdown block-quotes.
Yes, CVE-2022-0488 can be exploited remotely by sending crafted markdown requests to the GitLab server.