{"id":"CVE-2020-13333","details":"A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.","aliases":["BIT-gitlab-2020-13333"],"modified":"2026-04-10T04:22:13.403474Z","published":"2020-10-06T19:15:13.257Z","references":[{"type":"ADVISORY","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13333.json"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/218753"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/870820"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"0"},{"last_affected":"1fa237df2f46d34bd56dd8d018183c756094c2e0"},{"introduced":"0"},{"last_affected":"1fa237df2f46d34bd56dd8d018183c756094c2e0"},{"introduced":"0"},{"last_affected":"ce28f708ec5ca68092e16f55e47710367d32f2a1"},{"introduced":"0"},{"last_affected":"ce28f708ec5ca68092e16f55e47710367d32f2a1"},{"introduced":"0"},{"last_affected":"4922d2720ace5802587b8324a77a41b373d08e69"},{"introduced":"0"},{"last_affected":"4922d2720ace5802587b8324a77a41b373d08e69"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"13.1.0"},{"introduced":"0"},{"last_affected":"13.1.0"},{"introduced":"0"},{"last_affected":"13.2.0"},{"introduced":"0"},{"last_affected":"13.2.0"},{"introduced":"0"},{"last_affected":"13.3.0"},{"introduced":"0"},{"last_affected":"13.3.0"}]}}],"versions":["11-10-0cfa69752d8-0d9531c80-ee","11-10-0cfa69752d8-74ffd66ae-ee","11-10-119f9509d50-6d7537235-ee","v1.2.0","v1.2.0pre","v1.2.1","v1.2.2","v13.1.0-ee","v13.1.0-rc42-ee","v13.2.0-ee","v13.2.0-rc42-ee","v13.2.0-rc43-ee","v13.2.0-rc44-ee","v13.3.0-ee","v13.3.0-rc42-ee","v13.3.0-rc43-ee","v13.3.0-rc44-ee","v2.3.0","v2.3.0pre","v2.3.1","v2.4.0","v2.4.0pre","v2.4.1","v2.5.0","v2.6.0","v2.6.0pre","v2.6.1","v2.6.2","v2.6.3","v2.7.0","v2.7.0pre","v2.8.0","v2.8.0pre","v2.8.1","v2.8.2","v2.9.0","v2.9.1","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v4.0.0","v4.0.0rc1","v4.0.0rc2","v5.0.0","v5.1.0","v5.2.0","v6.0.0-ee","v6.0.0-ee.beta","v6.0.0-ee.rc1","v6.1.0-ee","v6.3.0-ee","v6.3.1-ee","v6.4.0-ee","v6.5.0-ee","v6.6.0-ee","v6.7.0-ee","v6.7.0.rc1-ee","v6.8.0-ee","v7.0.0-ee","v7.1.0-ee","v7.1.0.rc1-ee","v7.2.0.rc1-ee","v7.2.0.rc2-ee","v7.2.0.rc3-ee","v7.2.0.rc4-ee","v7.2.0.rc5-ee","v7.3.0-ee","v7.3.0.rc1-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13333.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}]}