First published: Wed Jun 07 2023(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.0.0<15.10.8 | |
GitLab | >=12.0.0<15.10.8 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=15.11.0<15.11.7 | |
GitLab | >=16.0.0<16.0.2 | |
GitLab | >=16.0.0<16.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2199 is categorized as a Regular Expression Denial of Service (ReDoS) vulnerability.
To fix CVE-2023-2199, upgrade your GitLab installation to version 15.10.8 or higher, 15.11.7 or higher, or 16.0.2 or higher.
CVE-2023-2199 affects GitLab versions from 12.0 up to 15.10.8, from 15.11.0 to 15.11.7, and from 16.0.0 to 16.0.2.
CVE-2023-2199 involves a Regular Expression Denial of Service attack via crafted payloads.
Yes, CVE-2023-2199 is present in both GitLab Community Edition (CE) and Enterprise Edition (EE) across the affected versions.