Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/randomrobbiebf/cve-2023-7028
CVE-2023-7028
https://github.com/randomrobbiebf/cve-2023-7028
cve-2023-7028 gitlab
Last synced: about 2 months ago
JSON representation
CVE-2023-7028
- Host: GitHub
- URL: https://github.com/randomrobbiebf/cve-2023-7028
- Owner: RandomRobbieBF
- Created: 2024-01-12T10:53:50.000Z (almost 1 year ago)
- Default Branch: main
- Last Pushed: 2024-01-12T13:56:38.000Z (almost 1 year ago)
- Last Synced: 2024-01-12T23:36:09.051Z (12 months ago)
- Topics: cve-2023-7028, gitlab
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 5
- Watchers: 1
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2023-7028
Gitlab CVE-2023-7028: Account Takeover via Password Reset without user interactions
A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords.
While also vulnerable, users who have two-factor authentication enabled on their account are safe from account takeover. Also LDAP logins are safe too!
### About CVE-2023-7028
CVE-2023-7028 affects GitLab self-managed instances running GitLab Community Edition (CE) and Enterprise Edition (EE) versions:
* 16.1 prior to 16.1.5
* 16.2 prior to 16.2.8
* 16.3 prior to 16.3.6
* 16.4 prior to 16.4.4
* 16.5 prior to 16.5.6
* 16.6 prior to 16.6.4
* 16.7 prior to 16.7.2How to use
---```
usage: CVE-2023-7028.py [-h] [-u URL] -v VICTIM -a ATTACKER [-p PROXY]options:
-h, --help show this help message and exit
-u URL, --url URL URL of host to check will need http or https
-v VICTIM, --victim VICTIM
victim email address
-a ATTACKER, --attacker ATTACKER
attacker email address
-p PROXY, --proxy PROXY
Proxy for debugging
```