Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks

Posted on May 22, 2025May 23, 2025 By CWS

GitLab has launched essential safety patches addressing 11 vulnerabilities throughout its Neighborhood Version (CE) and Enterprise Version (EE) platforms, with a number of high-risk flaws enabling denial-of-service (DoS) assaults. 

The coordinated launch of variations 18.0.1, 17.11.3, and 17.10.7 comes because the DevOps platform confronts a number of assault vectors that might destabilize methods by means of useful resource exhaustion, authentication bypasses, and information publicity dangers.

This safety replace represents GitLab’s most complete remediation effort in 2025, impacting all deployment fashions together with omnibus, supply code, and helm chart installations. 

The corporate strongly recommends that every one self-managed GitLab installations be upgraded instantly, whereas noting that GitLab.com is already operating the patched model.

Vital Massive Blob Endpoint Vulnerability 

Probably the most extreme vulnerability (CVE-2025-0993) allows authenticated attackers to set off server useful resource exhaustion by means of an unprotected massive blob endpoint, scoring 7.5 on the CVSS v3.1 scale. 

This high-severity flaw impacts all installations previous to the patched variations, permitting risk actors to overwhelm methods by repeatedly submitting outsized information payloads.

A Git blob (binary massive object) is the item sort used to retailer the contents of every file in a repository. 

The vulnerability seems to use GitLab’s dealing with of those blobs, which for sizes bigger than 10 MB have already got a charge restrict of 5 requests per minute. 

The safety crew confirmed this vulnerability might maintain extended downtime in unprotected environments.

Medium-Severity DoS Assault Vectors Patched

A number of extra medium-severity DoS vectors had been recognized and addressed on this launch:

CVE-2025-3111 (CVSS 6.5): Unbounded Kubernetes cluster tokens might result in DoS. An absence of enter validation within the Kubernetes integration permits authenticated customers to trigger a denial of service by producing extreme tokens.

CVE-2025-2853 (CVSS 6.5): Unvalidated notes place could result in Denial of Service. An absence of correct validation in GitLab might enable an authenticated person to set off a DoS situation.

CVE-2024-7803 (CVSS 6.5): A Discord webhook integration could trigger DoS. This vulnerability impacts all variations from 11.6 earlier than the patched releases.

Earlier analysis has proven that webhook performance in GitLab might be abused for DoS assaults. 

As famous in a single bug report: “Since there is no such thing as a charge restrict on the gitlab.com webhook perform, attackers can use this to ship a number of requests to the victims server”.

GitLab urges directors to take rapid motion:

Improve instantly: “We strongly advocate that every one installations operating a model affected by the problems described are upgraded to the most recent model as quickly as potential”.

Apply correct enter validation: Most of the vulnerabilities stem from insufficient validation of person inputs, significantly for blobs, notes positions, and Kubernetes tokens.

Monitor system sources: Throughout potential assaults, monitoring CPU and reminiscence utilization might help establish exploitation makes an attempt. 

Instructions like htop for normal system reminiscence utilization and dmesg -T -w for kernel logs might be helpful diagnostic instruments.

Contemplate object storage configuration: For big situations, configuring correct object storage with acceptable limits might help mitigate blob-related assaults.

These vulnerabilities collectively exhibit the continuing challenges in securing advanced DevOps platforms in opposition to useful resource exhaustion assaults, significantly when dealing with massive binary objects and exterior integrations.

Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:Attackers, Attacks, DoS, GitLab, Multiple, Trigger, Vulnerabilities

Post navigation

Previous Post: Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
Next Post: INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia

Related Posts

Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
Guide to Cloud API Security Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Implement Least Privilege Access
  • Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
  • Ingram Micro Scrambling to Restore Systems After Ransomware Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Implement Least Privilege Access
  • Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
  • Ingram Micro Scrambling to Restore Systems After Ransomware Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News