A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
{
"severity": "Medium",
"cpes": [
"cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
]
}