First published: Thu Mar 09 2023(Updated: )
An issue has been discovered in GitLab affecting all versions starting from 9.0 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible to trigger a resource depletion attack due to improper filtering for number of requests to read commits details.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=9.0<15.7.8 | |
GitLab | >=9.0<15.7.8 | |
GitLab | >=15.8<15.8.4 | |
GitLab | >=15.8<15.8.4 | |
GitLab | >=15.9<15.9.2 | |
GitLab | >=15.9<15.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1072 is classified as a medium severity vulnerability due to its potential for resource depletion attacks.
To resolve CVE-2023-1072, upgrade GitLab to version 15.7.8 or later, 15.8.4 or later, or 15.9.2 or later.
CVE-2023-1072 affects GitLab versions from 9.0 up to but not including 15.7.8, 15.8 up to but not including 15.8.4, and 15.9 up to but not including 15.9.2.
CVE-2023-1072 allows attackers to trigger resource depletion attacks due to improper filtering of request numbers.
Yes, CVE-2023-1072 affects both GitLab Community and Enterprise editions across the identified vulnerable versions.