First published: Tue Aug 01 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab GitLab | >=15.2<16.0.8 | |
GitLab GitLab | >=15.2<16.0.8 | |
GitLab GitLab | >=16.1<16.1.3 | |
GitLab GitLab | >=16.1<16.1.3 | |
GitLab GitLab | >=16.2<16.2.2 | |
GitLab GitLab | >=16.2<16.2.2 |
Upgrade to versions 16.2.2, 16.1.3, 16.0.8 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0632 is a vulnerability discovered in GitLab that affects all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, and all versions starting from 16.2 before 16.2.2.
CVE-2023-0632 has a severity rating of high with a CVSS score of 7.5.
CVE-2023-0632 allows a Regular Expression Denial of Service by using crafted payloads to search Harbor Registry.
All versions of GitLab starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, and all versions starting from 16.2 before 16.2.2 are affected by CVE-2023-0632.
To fix CVE-2023-0632, update GitLab to version 16.0.8, 16.1.3, or 16.2.2 or later.