{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T11:50:47.625","vulnerabilities":[{"cve":{"id":"CVE-2020-13333","sourceIdentifier":"cve@gitlab.com","published":"2020-10-06T19:15:13.257","lastModified":"2024-11-21T05:01:03.267","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage."},{"lang":"es","value":"Se detectó una potencial vulnerabilidad de DOS en GitLab versiones 13.1, 13.2 y 13.3.&#xa0;La API para actualizar un activo como un enlace desde una versión que tenía una comprobación de expresiones regulares que causó un número exponencial de retrocesos para determinados valores suministrados por el usuario, resultando en un alto uso de la CPU"}],"metrics":{"cvssMetricV31":[{"source":"cve@gitlab.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:community:*:*:*","matchCriteriaId":"2FBE37DE-E9C5-40DC-8339-200551D68184"},{"vulnerable":true,"criteria":"cpe:2.3:a:gitlab:gitlab:13.1.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"89B666E9-BE49-44A5-8FE0-1DF2A370A983"},{"vulnerable":true,"criteria":"cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:community:*:*:*","matchCriteriaId":"82900A58-AAF4-4D9C-A91A-3C86DE7A46F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:gitlab:gitlab:13.2.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"F7C9C545-5519-492A-81D7-AC1EC365167A"},{"vulnerable":true,"criteria":"cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:community:*:*:*","matchCriteriaId":"3A4E3640-AED5-4318-85B9-91F41264FB09"},{"vulnerable":true,"criteria":"cpe:2.3:a:gitlab:gitlab:13.3.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"1CF330C9-F018-4F2C-B673-8A38B9434C99"}]}]}],"references":[{"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13333.json","source":"cve@gitlab.com","tags":["Third Party Advisory"]},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/218753","source":"cve@gitlab.com","tags":["Broken Link"]},{"url":"https://hackerone.com/reports/870820","source":"cve@gitlab.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13333.json","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://gitlab.com/gitlab-org/gitlab/-/issues/218753","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://hackerone.com/reports/870820","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}