An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a specific POST request.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Gitlab | Gitlab | 16.4.0 (including) | 17.1.7 (excluding) | 
| Gitlab | Gitlab | 17.2.0 (including) | 17.2.5 (excluding) | 
| Gitlab | Gitlab | 17.3.0 (including) | 17.3.2 (excluding) | 
| Gitlab | Ubuntu | esm-apps/xenial | * | 
| Gitlab | Ubuntu | upstream | * | 
	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.