{"id":"CVE-2023-0632","summary":"Inefficient Regular Expression Complexity in GitLab","details":"An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry.","aliases":["BIT-gitlab-2023-0632"],"modified":"2026-04-10T04:55:13.994251Z","published":"2023-08-01T23:36:30.662Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0632.json","cna_assigner":"GitLab","cwe_ids":["CWE-1333"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0632.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0632"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/390148"},{"type":"REPORT","url":"https://hackerone.com/reports/1852677"},{"type":"PACKAGE","url":"git://git@gitlab.com:gitlab-org/gitlab.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"d836c22d87f6f0397b93cc72ce3af27a6dc02d93"},{"fixed":"b989ef135498a860c86648c76637bb14442da7c5"}],"database_specific":{"versions":[{"introduced":"15.2"},{"fixed":"16.0.8"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"4961ad113f3afe23965ac12285eaab31315ab0c6"},{"fixed":"6bcf60f9a21c6f86f2f4760b7055919a3d33ce62"}],"database_specific":{"versions":[{"introduced":"16.1.0"},{"fixed":"16.1.3"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"3adc0fe6e7c163bedd7faa5f0c4d1e5fbb6bf3c5"},{"fixed":"2e273e251efba974e60d7c2e73df2dc30b89a816"}],"database_specific":{"versions":[{"introduced":"16.2.0"},{"fixed":"16.2.2"}]}}],"versions":["v16.1.0-ee","v16.2.0-ee","v16.2.1-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0632.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}