Discover the impact of CVE-2022-3759 affecting GitLab CE/EE versions 14.3 to 15.8.1. Learn how an attacker can trigger a DoS through a crafted CI job artifact upload.
An issue has been discovered in GitLab CE/EE impacting versions 14.3 to 15.8.1. An attacker can trigger a Denial of Service by uploading a crafted CI job artifact zip file.
Understanding CVE-2022-3759
This CVE affects GitLab CE/EE versions between 14.3 to 15.8.1, allowing attackers to exploit a vulnerability leading to Denial of Service.
What is CVE-2022-3759?
The vulnerability in GitLab CE/EE versions before 15.6.7, 15.7.6, and 15.8.1 allows an attacker to upload a specially crafted CI job artifact zip file, causing a Sidekiq job to consume excessive memory, potentially resulting in Denial of Service.
The Impact of CVE-2022-3759
Exploitation of this vulnerability could lead to Denial of Service in GitLab instances that have memory-limited Sidekiq, affecting service availability.
Technical Details of CVE-2022-3759
The following technical details provide insight into the vulnerability, affected systems, and the exploitation mechanism.
Vulnerability Description
The vulnerability allows an attacker to upload a malicious CI job artifact zip file, leading to Sidekiq job memory allocation issues, impacting availability.
Affected Systems and Versions
GitLab CE/EE versions from 14.3 to 15.8.1 are affected by this vulnerability, with versions 15.6.7, 15.7.6, and 15.8.1 being safe from exploitation.
Exploitation Mechanism
By uploading a crafted CI job artifact zip file in projects utilizing dynamic child pipelines, an attacker can cause a Sidekiq job to allocate excessive memory, potentially creating a Denial of Service condition.
Mitigation and Prevention
To address CVE-2022-3759, immediate actions must be taken along with long-term security practices and timely patching.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure timely installation of security patches provided by GitLab to mitigate the risk of exploitation and enhance system security.