{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-4912","assignerOrgId":"ceab7361-8a18-47b1-92ba-4d7d25f6715a","state":"PUBLISHED","assignerShortName":"GitLab","dateReserved":"2023-09-12T13:30:21.852Z","datePublished":"2023-12-01T07:01:48.155Z","dateUpdated":"2026-04-30T04:06:57.160Z"},"containers":{"cna":{"title":"Allocation of Resources Without Limits or Throttling in GitLab","descriptions":[{"lang":"en","value":"An issue has been discovered in GitLab EE affecting all versions starting from 10.5 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted mermaid diagram input."}],"affected":[{"vendor":"GitLab","product":"GitLab","repo":"git://git@gitlab.com:gitlab-org/gitlab.git","cpes":["cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"],"versions":[{"version":"10.5","status":"affected","lessThan":"16.4.3","versionType":"semver"},{"version":"16.5","status":"affected","lessThan":"16.5.3","versionType":"semver"},{"version":"16.6","status":"affected","lessThan":"16.6.1","versionType":"semver"}],"defaultStatus":"unaffected"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-770: Allocation of Resources Without Limits or Throttling","cweId":"CWE-770","type":"CWE"}]}],"references":[{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/424882","name":"GitLab Issue #424882","tags":["issue-tracking","permissions-required"]},{"url":"https://hackerone.com/reports/2137421","name":"HackerOne Bug Bounty Report #2137421","tags":["technical-description","exploit","permissions-required"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":2.6,"baseSeverity":"LOW"}}],"solutions":[{"lang":"en","value":"Upgrade to versions 16.4.3, 16.5.3, 16.6.1 or above."}],"credits":[{"lang":"en","value":"Thanks [toukakirishima](https://hackerone.com/toukakirishima) for reporting this vulnerability through our HackerOne bug bounty program","type":"finder"}],"providerMetadata":{"orgId":"ceab7361-8a18-47b1-92ba-4d7d25f6715a","shortName":"GitLab","dateUpdated":"2026-04-30T04:06:57.160Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:44:52.047Z"},"title":"CVE Program Container","references":[{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/424882","name":"GitLab Issue #424882","tags":["issue-tracking","x_transferred"]},{"url":"https://hackerone.com/reports/2137421","name":"HackerOne Bug Bounty Report #2137421","tags":["technical-description","exploit","x_transferred"]}]}]}}