First published: Mon Feb 13 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.3 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. An attacker may upload a crafted CI job artifact zip file in a project that uses dynamic child pipelines and make a sidekiq job allocate a lot of memory. In GitLab instances where Sidekiq is memory-limited, this may cause Denial of Service.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=14.3<15.6.7 | |
GitLab | >=14.3<15.6.7 | |
GitLab | >=15.7<15.7.6 | |
GitLab | >=15.7<15.7.6 | |
GitLab | >=15.8<15.8.1 | |
GitLab | >=15.8<15.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3759 has been assigned a medium severity level due to its potential for exploitation via crafted CI job artifacts.
To mitigate CVE-2022-3759, upgrade GitLab to version 15.6.7 or later, or versions 15.7.6 or later, or version 15.8.1 or later.
CVE-2022-3759 affects all GitLab CE/EE versions starting from 14.3 before 15.6.7, 15.7 before 15.7.6, and 15.8 before 15.8.1.
Yes, CVE-2022-3759 can be exploited remotely if an attacker uploads a malicious CI job artifact.
CVE-2022-3759 may allow unauthorized users to access project artifacts due to insecure handling of uploaded zip files.