First published: Mon Feb 13 2023(Updated: )
A lack of length validation in GitLab CE/EE affecting all versions from 12.4 before 15.6.7, 15.7 before 15.7.6, and 15.8 before 15.8.1 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.4<15.6.7 | |
GitLab | >=12.4<15.6.7 | |
GitLab | >=15.7<15.7.6 | |
GitLab | >=15.7<15.7.6 | |
GitLab | >=15.8<15.8.1 | |
GitLab | >=15.8<15.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3411 has a medium severity rating due to its impact on CPU usage under specific attack conditions.
To fix CVE-2022-3411, upgrade GitLab to the latest version above 15.6.7, 15.7.6, or 15.8.1.
CVE-2022-3411 affects all GitLab CE/EE versions starting from 12.4 up to 15.6.7, 15.7 up to 15.7.6, and 15.8 up to 15.8.1.
CVE-2022-3411 allows an authenticated attacker to create a large Issue description that can exploit CPU resources by repeated requests.
Yes, an attacker must be authenticated to exploit CVE-2022-3411 and create a large Issue description.