First published: Wed Jun 07 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.7.0<15.10.8 | |
GitLab | >=8.7.0<15.10.8 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=16.0.0<16.0.2 | |
GitLab | >=16.0.0<16.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2198 has a moderate severity rating due to its potential to cause a Regular Expression Denial of Service.
To fix CVE-2023-2198, update GitLab to version 15.10.8, 15.11.7, or 16.0.2 or newer.
CVE-2023-2198 affects GitLab versions from 8.7 through 15.10.7, 15.11.0 through 15.11.6, and 16.0.0 through 16.0.1.
CVE-2023-2198 is classified as a Regular Expression Denial of Service vulnerability.
There is currently no documented workaround for mitigating CVE-2023-2198 other than applying the provided updates.