Skip to main content

CVE-2023-4912: CWE-770: Allocation of Resources Without Limits or Throttling in GitLab GitLab

Low
VulnerabilityCVE-2023-4912cvecve-2023-4912cwe-770
Published: Fri Dec 01 2023 (12/01/2023, 07:01:48 UTC)
Source: CVE
Vendor/Project: GitLab
Product: GitLab

Description

An issue has been discovered in GitLab EE affecting all versions starting from 10.5 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted mermaid diagram input.

AI-Powered Analysis

AILast updated: 07/07/2025, 11:55:04 UTC

Technical Analysis

CVE-2023-4912 is a vulnerability identified in GitLab Enterprise Edition (EE) affecting versions from 10.5 up to but not including 16.4.3, versions from 16.5 up to 16.5.3, and versions from 16.6 up to 16.6.1. The issue is classified under CWE-770, which pertains to the allocation of resources without limits or throttling. Specifically, this vulnerability arises from the way GitLab processes Mermaid diagram inputs. Mermaid is a popular tool integrated into GitLab for rendering diagrams and flowcharts from text definitions. An attacker can craft malicious Mermaid diagram input that triggers excessive resource consumption on the client side, leading to a denial of service (DoS) condition. This DoS is client-side, meaning it affects the user's browser or client application rendering the diagram rather than the GitLab server directly. The CVSS v3.1 base score is 2.6, indicating a low severity level. The vector indicates that the attack can be performed remotely (AV:N) but requires high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may rely on updating to fixed versions or applying vendor advisories once available. The vulnerability highlights the risk of insufficient input validation or resource management when rendering complex or maliciously crafted Mermaid diagrams, which can cause the client application to consume excessive memory or CPU, resulting in unresponsiveness or crashes.

Potential Impact

For European organizations using GitLab EE, this vulnerability primarily threatens the availability of client systems rendering Mermaid diagrams. While the impact is limited to client-side denial of service, it can disrupt developer workflows, especially in teams heavily reliant on Mermaid diagrams for documentation, planning, or visualization within GitLab. This could lead to productivity loss and potential delays in development cycles. Since the vulnerability requires user interaction (viewing or rendering the malicious diagram), social engineering or embedding malicious diagrams in shared repositories or merge requests could be vectors for exploitation. Organizations with large distributed teams or those using GitLab for collaborative documentation are at higher risk of encountering this issue. The low CVSS score indicates limited severity; however, in environments where availability and uninterrupted access to documentation are critical, even client-side DoS can have operational impacts. Additionally, if attackers combine this with other vulnerabilities or social engineering tactics, it could be part of a broader attack strategy. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Upgrade GitLab EE to versions beyond 16.4.3, 16.5.3, or 16.6.1 as applicable, once patches are officially released by GitLab. 2. Until patches are applied, restrict or disable Mermaid diagram rendering in GitLab, especially in environments where untrusted users can submit or modify Mermaid content. 3. Implement client-side protections such as browser extensions or security policies that limit resource usage or sandbox rendering processes to prevent client crashes. 4. Educate users about the risks of opening or rendering Mermaid diagrams from untrusted sources to reduce the likelihood of user interaction with malicious content. 5. Monitor GitLab repositories and merge requests for suspicious or unusually complex Mermaid diagrams that could indicate attempts to exploit this vulnerability. 6. Employ network-level controls or web application firewalls (WAFs) to detect and block malicious payloads targeting Mermaid rendering if feasible. 7. Maintain regular backups and incident response plans to quickly recover from any disruptions caused by client-side DoS incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2023-09-12T13:30:21.852Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ea68a0acd01a249253fa2

Added to database: 5/22/2025, 4:22:34 AM

Last enriched: 7/7/2025, 11:55:04 AM

Last updated: 7/28/2025, 6:02:15 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats