6.5

CVE-2024-3114

An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server.

Data is provided by the National Vulnerability Database (NVD)
GitlabGitlab SwEditioncommunity Version >= 11.10.0 < 17.0.6
GitlabGitlab SwEditionenterprise Version >= 11.10.0 < 17.0.6
GitlabGitlab SwEditioncommunity Version >= 17.1.0 < 17.1.4
GitlabGitlab SwEditionenterprise Version >= 17.1.0 < 17.1.4
GitlabGitlab SwEditioncommunity Version >= 17.2.0 < 17.2.2
GitlabGitlab SwEditionenterprise Version >= 17.2.0 < 17.2.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.15% 0.362
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
cve@gitlab.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.