First published: Thu Jan 12 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in how the application parses user agents.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.8.0<15.5.7 | |
GitLab | >=10.8.0<15.5.7 | |
GitLab | >=15.6.0<15.6.4 | |
GitLab | >=15.6.0<15.6.4 | |
GitLab | >=15.7.0<15.7.2 | |
GitLab | >=15.7.0<15.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4131 has been classified as a Denial of Service vulnerability.
To fix CVE-2022-4131, upgrade GitLab to version 15.5.7 or later, 15.6.4 or later, or 15.7.2 or later.
CVE-2022-4131 affects GitLab CE/EE versions from 10.8 to 15.5.7 and from 15.6 to 15.6.4 and from 15.7 to 15.7.2.
Yes, CVE-2022-4131 can be exploited remotely, potentially leading to a Denial of Service.
There are no known workarounds for CVE-2022-4131; updating to a patched version is recommended.