CVE-2025-1072

6.5 MEDIUM

📋 TL;DR

A denial-of-service vulnerability in GitLab CE/EE allows attackers to crash the service by importing maliciously crafted content via the Fogbugz importer. This affects all GitLab instances running vulnerable versions, potentially disrupting development workflows and CI/CD pipelines.

💻 Affected Systems

Products:
  • GitLab Community Edition
  • GitLab Enterprise Edition
Versions: 7.14.1 to 17.3.6, 17.4.0 to 17.4.3, 17.5.0 to 17.5.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with Fogbugz importer enabled are vulnerable. The importer is available by default in affected versions.

📦 What is this software?

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

Gitlab by Gitlab

GitLab is a complete DevOps platform providing source code management, CI/CD pipelines, security scanning, container registry, and collaboration tools used by millions of developers and thousands of enterprises worldwide. As both a cloud-hosted SaaS offering (GitLab.com) and self-managed software, G...

Learn more about Gitlab →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability requiring manual restart, disrupting all GitLab operations including code repositories, CI/CD pipelines, and issue tracking.

🟠

Likely Case

Temporary service disruption affecting import functionality and potentially causing broader system instability until restart.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring; import attempts blocked or logged for investigation.

🌐 Internet-Facing: MEDIUM - Requires authenticated access to import functionality, but internet-facing instances are more exposed to attack attempts.
🏢 Internal Only: LOW - Internal instances have reduced attack surface but still vulnerable to insider threats or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access to import functionality. The vulnerability is well-documented in public disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.3.7, 17.4.4, or 17.5.2

Vendor Advisory: https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/#denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload

Restart Required: Yes

Instructions:

1. Backup your GitLab instance. 2. Update to GitLab 17.3.7, 17.4.4, or 17.5.2 based on your current version. 3. Follow GitLab's upgrade documentation for your deployment method (Omnibus, Docker, Helm, etc.). 4. Restart the GitLab service.

🔧 Temporary Workarounds

Disable Fogbugz Importer

linux

Temporarily disable the vulnerable import functionality until patching is complete.

# Edit GitLab configuration
# For Omnibus: edit /etc/gitlab/gitlab.rb
# Add: gitlab_rails['import_sources'] = gitlab_rails['import_sources'] - ['fogbugz']
# Then run: gitlab-ctl reconfigure

Restrict Import Permissions

all

Limit import capabilities to trusted administrators only.

# Via GitLab UI: Admin Area > Settings > General > Visibility and access controls
# Set 'Import sources' to 'Administrators only' or disable entirely

🧯 If You Can't Patch

  • Implement strict access controls to limit import functionality to essential personnel only.
  • Monitor import logs for suspicious activity and implement rate limiting on import endpoints.

🔍 How to Verify

Check if Vulnerable:

Check GitLab version via Admin Area > Overview or run: sudo gitlab-rake gitlab:env:info | grep 'GitLab version'

Check Version:

sudo gitlab-rake gitlab:env:info | grep 'GitLab version'

Verify Fix Applied:

Confirm version is 17.3.7, 17.4.4, or 17.5.2 or higher. Test import functionality with safe test data.

📡 Detection & Monitoring

Log Indicators:

  • Failed import attempts with malformed data
  • Unusual import activity from non-admin users
  • Service restart logs following import attempts

Network Indicators:

  • Unusually large import payloads
  • Multiple import requests from single source in short timeframe

SIEM Query:

source="gitlab.log" AND ("import" OR "fogbugz") AND ("error" OR "failed" OR "malformed")

🔗 References

📤 Share & Export