Vulnerability Description
A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 8.3.0, < 15.10.8 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0921.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/392433Issue TrackingVendor Advisory
- https://hackerone.com/reports/1869839Permissions RequiredThird Party Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0921.jsonVendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/392433Issue TrackingVendor Advisory
- https://hackerone.com/reports/1869839Permissions RequiredThird Party Advisory
FAQ
What is CVE-2023-0921?
CVE-2023-0921 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue descri...
How severe is CVE-2023-0921?
CVE-2023-0921 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0921?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.