First published: Mon Oct 17 2022(Updated: )
A lack of length validation in Snippet descriptions in GitLab CE/EE affecting all versions prior to 15.1.6, 15.2 prior to 15.2.4 and 15.3 prior to 15.3.2 allows an authenticated attacker to create a maliciously large Snippet which when requested with or without authentication places excessive load on the server, potential leading to Denial of Service.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.1.6 | |
GitLab | <15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2592 is classified as a medium severity vulnerability due to its potential for denial of service.
To fix CVE-2022-2592, upgrade GitLab to version 15.1.6, 15.2.4, or 15.3.2 or later.
CVE-2022-2592 affects all versions of GitLab Community and Enterprise Editions prior to the specified patched versions.
An authenticated attacker can exploit CVE-2022-2592 by creating a maliciously large Snippet, causing excessive load on the server.
The vulnerability in CVE-2022-2592 specifically impacts Snippet descriptions in GitLab.