First published: Thu May 23 2024(Updated: )
A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions before 16.10.6, version 16.11 before 16.11.3, and 17.0 before 17.0.1. It is possible for an attacker to cause a denial of service using a crafted wiki page.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.10.6 | |
GitLab | <16.10.6 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | >=16.11.0<16.11.3 | |
GitLab | =17.0.0 | |
GitLab | =17.0.0 |
Upgrade to versions 16.10.6, 16.11.3, 17.0.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6502 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2023-6502, upgrade to GitLab version 16.10.6 or later, 16.11.3 or later, or 17.0.1 or later.
CVE-2023-6502 affects all GitLab versions prior to 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1.
Yes, CVE-2023-6502 can be exploited remotely by an attacker using a specially crafted wiki page.
CVE-2023-6502 can result in a complete denial of service for GitLab installations.