A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
{ "cpes": [ "cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ], "severity": "Medium" }