Update CVE-2020-26413.yaml
parent
5aeb4de8c8
commit
0e27f24138
|
@ -1,15 +1,15 @@
|
|||
id: CVE-2020-26413
|
||||
|
||||
info:
|
||||
name: GitLab information leak (CVE-2020-26413)
|
||||
author: _0xf4n9x_
|
||||
name: Gitlab User enumeration via Graphql API CVE-2020-26413
|
||||
author: _0xf4n9x_,pikpikcu
|
||||
severity: medium
|
||||
description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible.
|
||||
reference:
|
||||
- https://gitlab.com/gitlab-org/gitlab/-/issues/244275
|
||||
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26413.json
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2020-26413
|
||||
tags: exposure,cve,cve2020,gitlab
|
||||
tags: exposure,cve,cve2020,gitlab,enumeration
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -31,10 +31,20 @@ requests:
|
|||
part: body
|
||||
words:
|
||||
- "username"
|
||||
- "email"
|
||||
- "avatarUrl"
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- 'email":"([a-z@.]+)"'
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- '"email":"([a-z@.]+)"'
|
||||
|
|
Loading…
Reference in New Issue