First published: Mon Nov 06 2023(Updated: )
An issue has been discovered in GitLab EE with Advanced Search affecting all versions from 13.9 to 16.3.6, 16.4 prior to 16.4.2 and 16.5 prior to 16.5.1 that could allow a denial of service in the Advanced Search function by chaining too many syntax operators.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.9.0<=16.3.6 | |
GitLab | >=16.4.0<16.4.2 | |
GitLab | =16.5.0 |
Upgrade to version 16.3.6, 16.4.2, 16.5.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-5963.
The title of this vulnerability is Improper Input Validation in GitLab.
This vulnerability in GitLab EE with Advanced Search could allow a denial of service in the Advanced Search function by chaining too many syntax operators.
All versions from 13.9 to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1 are affected by this vulnerability.
The severity of CVE-2023-5963 is medium with a CVSS score of 4.3.
This vulnerability can be exploited by chaining too many syntax operators in the Advanced Search function of GitLab EE.
Yes, a fix is available in versions 16.4.2 and 16.5.1 of GitLab EE.
More information about this vulnerability can be found at the following reference: https://gitlab.com/gitlab-org/gitlab/-/issues/423468
The CWE ID for this vulnerability is CWE-20.