Home

Description

An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input.

PUBLISHED Reserved 2023-11-15 | Published 2024-01-26 | Updated 2026-05-06 | Assigner GitLab




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-1333: Inefficient Regular Expression Complexity

Product status

Default status
unaffected

12.7 (semver) before 16.6.6
affected

16.7 (semver) before 16.7.4
affected

16.8 (semver) before 16.8.1
affected

Credits

Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program finder

References

about.gitlab.com/...security-release-gitlab-16-8-1-released/

gitlab.com/gitlab-org/gitlab/-/issues/431924 (GitLab Issue #431924) issue-tracking

hackerone.com/reports/2251278 (HackerOne Bug Bounty Report #2251278) technical-description exploit

about.gitlab.com/...security-release-gitlab-16-8-1-released/

gitlab.com/gitlab-org/gitlab/-/issues/431924 (GitLab Issue #431924) issue-tracking permissions-required

hackerone.com/reports/2251278 (HackerOne Bug Bounty Report #2251278) technical-description exploit permissions-required

cve.org (CVE-2023-6159)

nvd.nist.gov (CVE-2023-6159)

Download JSON