Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlab | Gitlab | >= 12.7.0, < 16.6.6 |
Related Weaknesses (CWE)
References
- https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16Vendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/431924Broken Link
- https://hackerone.com/reports/2251278Permissions Required
- https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16Vendor Advisory
- https://gitlab.com/gitlab-org/gitlab/-/issues/431924Broken Link
- https://hackerone.com/reports/2251278Permissions Required
FAQ
What is CVE-2023-6159?
CVE-2023-6159 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expre...
How severe is CVE-2023-6159?
CVE-2023-6159 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6159?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlab Gitlab.