First published: Wed Jun 07 2023(Updated: )
A denial of service issue was discovered in GitLab CE/EE affecting all versions starting from 13.2.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2 which allows an attacker to cause high resource consumption using malicious test report artifacts.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.2.4<15.10.8 | |
GitLab | >=13.2.4<15.10.8 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=16.0.0<16.0.2 | |
GitLab | >=16.0.0<16.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0121 has been classified as a denial of service vulnerability that can lead to high resource consumption.
CVE-2023-0121 affects GitLab versions from 13.2.4 before 15.10.8, from 15.11 before 15.11.7, and from 16.0 before 16.0.2.
To fix CVE-2023-0121, upgrade your GitLab instance to the latest versions: 15.10.8, 15.11.7, or 16.0.2 and above.
CVE-2023-0121 can be exploited by attackers to cause denial of service through high resource consumption.
Currently, the best approach for CVE-2023-0121 is to apply the necessary updates as there are no effective workarounds.