Show plain JSON{"id": "CVE-2024-11828", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "cve@gitlab.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2024-11-26T19:15:22.910", "references": [{"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/443559", "tags": ["Broken Link"], "source": "cve@gitlab.com"}, {"url": "https://hackerone.com/reports/2380264", "tags": ["Permissions Required"], "source": "cve@gitlab.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Secondary", "source": "cve@gitlab.com", "description": [{"lang": "en", "value": "CWE-407"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "A denial of service (DoS) condition was discovered in GitLab CE/EE affecting all versions from 13.2.4 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls. This was a regression of an earlier patch."}, {"lang": "es", "value": "Se descubri\u00f3 una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afectaba a todas las versiones desde la 13.2.4 hasta la 17.4.5, desde la 17.5 hasta la 17.5.3 y desde la 17.6 hasta la 17.6.1. Al aprovechar esta vulnerabilidad, un atacante podr\u00eda crear una condici\u00f3n de denegaci\u00f3n de servicio mediante el env\u00edo de llamadas a la API manipuladas. Se trataba de una regresi\u00f3n de un parche anterior."}], "lastModified": "2024-12-12T21:07:04.270", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "72B7025D-4FC9-45E0-9C5D-53B7E3427A28", "versionEndExcluding": "17.4.5", "versionStartIncluding": "13.2.4"}, {"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "D1F2B993-9A01-41DD-ABC8-158559A03548", "versionEndExcluding": "17.4.5", "versionStartIncluding": "13.2.4"}, {"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "5C1F85A0-709A-4C88-9C40-93D3C47AFD54", "versionEndExcluding": "17.5.3", "versionStartIncluding": "17.5.0"}, {"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "305F5CB5-5B11-4AA7-ABAE-D4B9A05F6B4A", "versionEndExcluding": "17.5.3", "versionStartIncluding": "17.5.0"}, {"criteria": "cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "3A39B04B-D109-467A-82E1-3FE6CBA48FEE"}, {"criteria": "cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "1212AE23-98AB-4E7A-AAB5-0AD266DFC7D4"}], "operator": "OR"}]}], "sourceIdentifier": "cve@gitlab.com"}