CVE-2024-2829: CWE-1333: Inefficient Regular Expression Complexity in GitLab GitLab
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service.
AI Analysis
Technical Summary
CVE-2024-2829 is a high-severity vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) versions starting from 12.5 up to versions prior to 16.9.6, as well as versions starting from 16.10 up to before 16.10.4, and versions starting from 16.11 up to before 16.11.1. The vulnerability arises from inefficient regular expression complexity in the FileFinder component of GitLab, specifically related to the handling of crafted wildcard filters. This inefficiency can be exploited to cause a denial of service (DoS) condition by triggering excessive CPU consumption or resource exhaustion when processing maliciously crafted input. The vulnerability is categorized under CWE-1333, which pertains to inefficient regular expression complexity leading to performance degradation. The CVSS v3.1 base score is 7.5 (high), with the vector indicating that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a viable target for denial of service attacks against GitLab instances exposed to untrusted users or networks. Since GitLab is widely used for source code management, CI/CD pipelines, and DevOps workflows, exploitation could disrupt development operations and continuous integration processes.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for enterprises, public sector entities, and technology companies relying heavily on GitLab for software development and deployment. A successful DoS attack could lead to prolonged service outages, halting development pipelines, delaying software releases, and potentially causing operational disruptions. This could affect productivity and lead to financial losses. Additionally, organizations providing GitLab as a service or hosting GitLab instances for clients could face reputational damage and contractual penalties due to service unavailability. Since the vulnerability does not compromise confidentiality or integrity, the primary concern is availability, which is critical in continuous integration and deployment environments. The risk is heightened for GitLab instances accessible over the internet or within large corporate networks where malicious actors or insiders could exploit the vulnerability without authentication or user interaction.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade affected GitLab instances to the fixed versions: 16.9.6 or later for the 16.9 branch, 16.10.4 or later for the 16.10 branch, and 16.11.1 or later for the 16.11 branch. If immediate upgrading is not feasible, organizations should restrict access to GitLab's FileFinder functionality by limiting network exposure, implementing strict firewall rules, and enforcing IP whitelisting to trusted users only. Monitoring and rate-limiting requests that involve wildcard filters or FileFinder usage can help detect and block potential exploitation attempts. Additionally, organizations should audit their GitLab usage patterns to identify any unusual spikes in resource consumption that could indicate exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious regex patterns or malformed requests targeting FileFinder may provide an additional layer of defense. Finally, maintaining regular backups and incident response plans will help minimize operational impact in case of an attack.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2024-2829: CWE-1333: Inefficient Regular Expression Complexity in GitLab GitLab
Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2024-2829 is a high-severity vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) versions starting from 12.5 up to versions prior to 16.9.6, as well as versions starting from 16.10 up to before 16.10.4, and versions starting from 16.11 up to before 16.11.1. The vulnerability arises from inefficient regular expression complexity in the FileFinder component of GitLab, specifically related to the handling of crafted wildcard filters. This inefficiency can be exploited to cause a denial of service (DoS) condition by triggering excessive CPU consumption or resource exhaustion when processing maliciously crafted input. The vulnerability is categorized under CWE-1333, which pertains to inefficient regular expression complexity leading to performance degradation. The CVSS v3.1 base score is 7.5 (high), with the vector indicating that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, but the vulnerability's characteristics make it a viable target for denial of service attacks against GitLab instances exposed to untrusted users or networks. Since GitLab is widely used for source code management, CI/CD pipelines, and DevOps workflows, exploitation could disrupt development operations and continuous integration processes.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for enterprises, public sector entities, and technology companies relying heavily on GitLab for software development and deployment. A successful DoS attack could lead to prolonged service outages, halting development pipelines, delaying software releases, and potentially causing operational disruptions. This could affect productivity and lead to financial losses. Additionally, organizations providing GitLab as a service or hosting GitLab instances for clients could face reputational damage and contractual penalties due to service unavailability. Since the vulnerability does not compromise confidentiality or integrity, the primary concern is availability, which is critical in continuous integration and deployment environments. The risk is heightened for GitLab instances accessible over the internet or within large corporate networks where malicious actors or insiders could exploit the vulnerability without authentication or user interaction.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade affected GitLab instances to the fixed versions: 16.9.6 or later for the 16.9 branch, 16.10.4 or later for the 16.10 branch, and 16.11.1 or later for the 16.11 branch. If immediate upgrading is not feasible, organizations should restrict access to GitLab's FileFinder functionality by limiting network exposure, implementing strict firewall rules, and enforcing IP whitelisting to trusted users only. Monitoring and rate-limiting requests that involve wildcard filters or FileFinder usage can help detect and block potential exploitation attempts. Additionally, organizations should audit their GitLab usage patterns to identify any unusual spikes in resource consumption that could indicate exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious regex patterns or malformed requests targeting FileFinder may provide an additional layer of defense. Finally, maintaining regular backups and incident response plans will help minimize operational impact in case of an attack.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2024-03-22T14:30:44.843Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ea68a0acd01a249253fee
Added to database: 5/22/2025, 4:22:34 AM
Last enriched: 7/7/2025, 12:12:44 PM
Last updated: 8/14/2025, 6:50:33 AM
Views: 16
Related Threats
CVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumCVE-2025-55726
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.