Description
A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-5593 | A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage. |
References
History
No history.
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2024-08-04T12:18:17.569Z
Reserved: 2020-05-21T00:00:00.000Z
Link: CVE-2020-13333
No data.
Status : Modified
Published: 2020-10-06T19:15:13.257
Modified: 2024-11-21T05:01:03.267
Link: CVE-2020-13333
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD