POC详情: e251df36457a715de541a4c56b83a96b91812516

来源
关联漏洞
标题: GitLab 路径遍历漏洞 (CVE-2020-10977)
描述:GitLab是美国GitLab公司的一款使用Ruby on Rails开发的、自托管的、Git(版本控制系统)项目仓库应用程序。该程序可用于查阅项目的文件内容、提交历史、Bug列表等。 GitLab(企业版和社区版)12.9之前版本中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
描述
Exploit for "GitLab Instance" Arbitrary server file read vulnerability
介绍
# Python Exploit for gitlab private instance arbitrary file read
At the date of 03/23/2020, a vulnerability report with its PoC was released in hackerone by **William Bowling**\
With this vulnerability we can read any world readable files (with permission 444 or more) on the gitlab server like /etc/passwd and so on... (worldreadable files only)\
```
Notice that you should be authenticated user
```

I've tested it on gitlab version 21.9.0 (ubuntu 18.04) but it's OS independent

# exploit-db
Many thanks to **exploit-db** team for publishing this exploit\
https://www.exploit-db.com/exploits/48431


# Credit
Many thanks to **William Bowling**\
vulnerability disclosed by : **William Bowling** of Biteable, a.k.a vakzz\
https://hackerone.com/reports/827052
文件快照

[4.0K] /data/pocs/e251df36457a715de541a4c56b83a96b91812516 ├── [ 760] README.md └── [7.9K] ReadServerFiles.py 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。