First published: Fri Jan 26 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.7.0<16.6.6 | |
GitLab | >=12.7.0<16.6.6 | |
GitLab | >=16.7.0<16.7.4 | |
GitLab | >=16.7.0<16.7.4 | |
GitLab | =16.8.0 | |
GitLab | =16.8.0 |
Upgrade to versions 16.8.1, 16.7.4, 16.6.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6159 is classified as high due to its potential for Denial of Service attacks.
To fix CVE-2023-6159, update your GitLab installation to version 16.8.1 or later.
CVE-2023-6159 affects GitLab CE/EE versions from 12.7 up to, but not including, 16.6.6, 16.7 up to, but not including, 16.7.4, and 16.8.0.
CVE-2023-6159 allows an attacker to execute a Regular Expression Denial of Service via a specially crafted Cargo.toml file.
There are no recommended workarounds for CVE-2023-6159; updating to a fixed version is necessary.