CVE-2022-1100

A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
GitLabCNA
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
VendorProductVersion
gitlabgitlab
13.1.0 ≤
𝑥
< 14.7.7
gitlabgitlab
13.1.0 ≤
𝑥
< 14.7.7
gitlabgitlab
14.8.0 ≤
𝑥
< 14.8.5
gitlabgitlab
14.8.0 ≤
𝑥
< 14.8.5
gitlabgitlab
14.9.0 ≤
𝑥
< 14.9.2
gitlabgitlab
14.9.0 ≤
𝑥
< 14.9.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gitlab
sid
16.8.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gitlab
xenial
ignored
trusty
ignored