Regular Expression Vulnerability in GitLab EE Affecting Multiple Versions
CVE-2020-13349

4.3MEDIUM

Key Information:

Vendor
Gitlab
Status
Vendor
CVE Published:
17 November 2020

Summary

A vulnerability exists in GitLab EE where the Advanced Search feature is prone to catastrophic backtracking due to an inefficient regular expression related to file paths. This affects GitLab versions starting from 8.12, with specific ranges identified that are susceptible to exploitation. Attackers could potentially leverage this flaw to degrade performance or cause denial of service, especially when processing complex search queries.

Affected Version(s)

GitLab EE >=8.12 >= 8.12

GitLab EE <13.3.9 < 13.3.9

GitLab EE >=13.4 >= 13.4

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This vulnerability has been discovered internally by the GitLab team
.