Description
An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular expression DoS attack on the server
Published: 2024-06-26
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to versions 17.1.1, 17.0.3, 16.11.5 or above.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-17241 An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular expression DoS attack on the server
History

Fri, 30 Aug 2024 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Thu, 29 Aug 2024 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2024-08-30T13:24:42.450Z

Reserved: 2024-02-14T16:02:21.502Z

Link: CVE-2024-1493

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.333Z

cve-icon NVD

Status : Modified

Published: 2024-06-27T00:15:10.283

Modified: 2024-11-21T08:50:42.043

Link: CVE-2024-1493

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses