{"id":"CVE-2023-3909","summary":"Inefficient Regular Expression Complexity in GitLab","details":"An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.3 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A Regular Expression Denial of Service was possible by adding a large string in timeout input in gitlab-ci.yml file.","aliases":["BIT-gitlab-2023-3909"],"modified":"2026-04-10T04:59:18.185392Z","published":"2023-11-06T12:08:45.129Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/3xxx/CVE-2023-3909.json","cwe_ids":["CWE-1333"],"cna_assigner":"GitLab"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/3xxx/CVE-2023-3909.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3909"},{"type":"REPORT","url":"https://gitlab.com/gitlab-org/gitlab/-/issues/418763"},{"type":"REPORT","url":"https://hackerone.com/reports/2050269"},{"type":"PACKAGE","url":"git://git@gitlab.com:gitlab-org/gitlab.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"c5ab21eda575676ffc46b85cab3456473c0357c6"},{"fixed":"128862473d18a7df991090bb25688a8c81fcb0fe"}],"database_specific":{"versions":[{"introduced":"12.3"},{"fixed":"16.3.6"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"e4c1c182610739c1b1d10a8eacbea1f5aa837ad6"},{"fixed":"385b9a2727ad972efe1fcdca3a61c447329ecd09"}],"database_specific":{"versions":[{"introduced":"16.4"},{"fixed":"16.4.2"}]}},{"type":"GIT","repo":"https://gitlab.com/gitlab-org/gitlab","events":[{"introduced":"fc87c9d4cca1536abcf902b4128f5c2004d87162"},{"fixed":"55da9ccb652fcf67641114264ecded0dab88f4dc"}],"database_specific":{"versions":[{"introduced":"16.5"},{"fixed":"16.5.1"}]}}],"versions":["v16.4.0-ee","v16.5.0-ee"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3909.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}]}