Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks

Posted on May 22, 2025May 23, 2025 By CWS

GitLab has launched essential safety patches addressing 11 vulnerabilities throughout its Neighborhood Version (CE) and Enterprise Version (EE) platforms, with a number of high-risk flaws enabling denial-of-service (DoS) assaults. 

The coordinated launch of variations 18.0.1, 17.11.3, and 17.10.7 comes because the DevOps platform confronts a number of assault vectors that might destabilize methods by means of useful resource exhaustion, authentication bypasses, and information publicity dangers.

This safety replace represents GitLab’s most complete remediation effort in 2025, impacting all deployment fashions together with omnibus, supply code, and helm chart installations. 

The corporate strongly recommends that every one self-managed GitLab installations be upgraded instantly, whereas noting that GitLab.com is already operating the patched model.

Vital Massive Blob Endpoint Vulnerability 

Probably the most extreme vulnerability (CVE-2025-0993) allows authenticated attackers to set off server useful resource exhaustion by means of an unprotected massive blob endpoint, scoring 7.5 on the CVSS v3.1 scale. 

This high-severity flaw impacts all installations previous to the patched variations, permitting risk actors to overwhelm methods by repeatedly submitting outsized information payloads.

A Git blob (binary massive object) is the item sort used to retailer the contents of every file in a repository. 

The vulnerability seems to use GitLab’s dealing with of those blobs, which for sizes bigger than 10 MB have already got a charge restrict of 5 requests per minute. 

The safety crew confirmed this vulnerability might maintain extended downtime in unprotected environments.

Medium-Severity DoS Assault Vectors Patched

A number of extra medium-severity DoS vectors had been recognized and addressed on this launch:

CVE-2025-3111 (CVSS 6.5): Unbounded Kubernetes cluster tokens might result in DoS. An absence of enter validation within the Kubernetes integration permits authenticated customers to trigger a denial of service by producing extreme tokens.

CVE-2025-2853 (CVSS 6.5): Unvalidated notes place could result in Denial of Service. An absence of correct validation in GitLab might enable an authenticated person to set off a DoS situation.

CVE-2024-7803 (CVSS 6.5): A Discord webhook integration could trigger DoS. This vulnerability impacts all variations from 11.6 earlier than the patched releases.

Earlier analysis has proven that webhook performance in GitLab might be abused for DoS assaults. 

As famous in a single bug report: “Since there is no such thing as a charge restrict on the gitlab.com webhook perform, attackers can use this to ship a number of requests to the victims server”.

GitLab urges directors to take rapid motion:

Improve instantly: “We strongly advocate that every one installations operating a model affected by the problems described are upgraded to the most recent model as quickly as potential”.

Apply correct enter validation: Most of the vulnerabilities stem from insufficient validation of person inputs, significantly for blobs, notes positions, and Kubernetes tokens.

Monitor system sources: Throughout potential assaults, monitoring CPU and reminiscence utilization might help establish exploitation makes an attempt. 

Instructions like htop for normal system reminiscence utilization and dmesg -T -w for kernel logs might be helpful diagnostic instruments.

Contemplate object storage configuration: For big situations, configuring correct object storage with acceptable limits might help mitigate blob-related assaults.

These vulnerabilities collectively exhibit the continuing challenges in securing advanced DevOps platforms in opposition to useful resource exhaustion assaults, significantly when dealing with massive binary objects and exterior integrations.

Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:Attackers, Attacks, DoS, GitLab, Multiple, Trigger, Vulnerabilities

Post navigation

Previous Post: Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
Next Post: INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia

Related Posts

Microsoft Zero Day Quest Hacking Contest Cyber Security News
New NFC-Driven PhantomCard Android Malware Attacking Banking Users Cyber Security News
5 Best IT Infrastructure Modernisation Services In 2025 Cyber Security News
Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords Cyber Security News
UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware Cyber Security News
Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark