{"id":"CVE-2022-1185","details":"A denial of service vulnerability when rendering RDoc files in GitLab CE/EE versions 10 to 14.7.7, 14.8.0 to 14.8.5, and 14.9.0 to 14.9.2 allows an attacker to crash the GitLab web application with a maliciously crafted RDoc file","aliases":["BIT-gitlab-2022-1185"],"modified":"2026-04-10T04:42:38.847127Z","published":"2022-04-04T19:46:09Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1185.json","cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1185.json"},{"type":"WEB","url":"https://hackerone.com/reports/1415071"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1185.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1185"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/349148"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"235b8d50ad14e7cdf4bc61c3df070f38dee97974"},{"fixed":"6d5453caf44cbb4379bebe8a406551db5441a5a2"}],"database_specific":{"versions":[{"introduced":"10.0"},{"fixed":"14.7.7"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"1d7d0b0a1db4c69533330ab29c6c0d3bdb17adba"},{"fixed":"fdf232e4acc50b3f86090b2c18253449577616dc"}],"database_specific":{"versions":[{"introduced":"14.8"},{"fixed":"14.8.5"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"1fdefb34741e329ede520eba6c3038eb48bfa191"},{"fixed":"3034418fb311e288d880c55ee707d9a3eecfe07d"}],"database_specific":{"versions":[{"introduced":"14.9"},{"fixed":"14.9.2"}]}}],"versions":["v14.8.0-ee","v14.8.1-ee","v14.8.3-ee","v14.8.4-ee","v14.9.0-ee","v14.9.1-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1185.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}