Invalid Commit Processing Can Lead to Regular Expression DoS Attack on Server
CVE-2024-3114
Key Information:
Badges
Summary
An issue has been identified in GitLab CE/EE that affects multiple versions, where the processing logic for parsing invalid commits is flawed. This vulnerability can potentially allow for a regular expression denial of service (DoS) attack on the server. Attackers may exploit this flaw by sending specially crafted invalid commit data which, when processed by the server, could lead to performance degradation or unavailability. The affected versions span from 11.10 to 17.2.2, underscoring the need for vigilance and timely updates to secure GitLab installations against such threats.
Affected Version(s)
GitLab 11.10 < 17.0.6
GitLab 17.1 < 17.1.4
GitLab 17.2 < 17.2.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved