An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gitlab | Gitlab | 11.10.0 (including) | 17.0.6 (excluding) |
Gitlab | Gitlab | 17.1.0 (including) | 17.1.4 (excluding) |
Gitlab | Gitlab | 17.2.0 (including) | 17.2.2 (excluding) |
Gitlab | Ubuntu | esm-apps/xenial | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.