
Cloud Vulnerability DB
A community-led vulnerabilities database
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in GitLab CE/EE, identified as CVE-2023-3424. The vulnerability affects all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, and all versions starting from 16.1 before 16.1.1. The issue was discovered in the preview_markdown endpoint where crafted payloads could trigger a denial of service condition (GitLab Issue, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The technical classification identifies this as a CWE-1333 (Inefficient Regular Expression Complexity) vulnerability, which can be exploited through the preview_markdown endpoint (NVD).
When successfully exploited, this vulnerability can lead to a Denial of Service condition affecting the availability of the GitLab service. The high CVSS score of 7.5 indicates significant potential impact on system availability, with no direct impact on confidentiality or integrity (NVD).
Users should upgrade to GitLab version 15.11.10, 16.0.6, or 16.1.1 or later, depending on their current version track. These versions contain the necessary fixes to address the ReDoS vulnerability (GitLab Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."