A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "13.1.0"
},
{
"introduced": "0"
},
{
"last_affected": "13.1.0"
},
{
"introduced": "0"
},
{
"last_affected": "13.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "13.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "13.3.0"
},
{
"introduced": "0"
},
{
"last_affected": "13.3.0"
}
]
}