一、 漏洞 CVE-2021-22205 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
GitLab CE/EE中发现了一个漏洞,该漏洞导致未能正确验证传递给文件解析器的图像文件,从而导致远程命令执行。

## 影响版本
所有从11.9版本开始的GitLab CE/EE版本。

## 漏洞细节
GitLab在处理传递给文件解析器的图像文件时未能进行充分验证,这可能导致攻击者利用此漏洞执行远程命令。

## 漏洞影响
攻击者可以利用此漏洞执行任意命令,危及系统的安全性和完整性。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
GitLab 代码注入漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
GitLab是美国GitLab公司的一个开源的端到端软件开发平台,具有内置的版本控制、问题跟踪、代码审查、CI/CD(持续集成和持续交付)等功能。 Gitlab Community Edition 存在代码注入漏洞,该漏洞源于图像解析器在处理图像文件时输入验证不正确。以下产品及版本受到影响::Gitlab Community Edition: 11.9.0, 11.9.1, 11.9.2, 11.9.3, 11.9.4, 11.9.5, 11.9.6, 11.9.7, 11.9.8, 11.9.9, 11
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
代码注入
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2021-22205 的公开POC
# POC 描述 源链接 神龙链接
1 None https://github.com/mr-r3bot/Gitlab-CVE-2021-22205 POC详情
2 Pocsuite3 For CVE-2021-22205 https://github.com/XTeam-Wing/CVE-2021-22205 POC详情
3 CVE-2021-22205 Unauthorized RCE https://github.com/r0eXpeR/CVE-2021-22205 POC详情
4 Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205 https://github.com/antx-code/CVE-2021-22205 POC详情
5 CVE-2021-22205& GitLab CE/EE RCE https://github.com/Al1ex/CVE-2021-22205 POC详情
6 CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖,可在win平台使用 https://github.com/whwlsfb/CVE-2021-22205 POC详情
7 PoC in single line bash https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205 POC详情
8 CVE-2021-22205未授权漏洞批量检测与利用工具 https://github.com/Seals6/CVE-2021-22205 POC详情
9 CVE-2021-22205 RCE https://github.com/c0okB/CVE-2021-22205 POC详情
10 CVE-2021-22205-getshell https://github.com/shang159/CVE-2021-22205-getshell POC详情
11 CVE-2021-22205& GitLab CE/EE RCE https://github.com/devdanqtuan/CVE-2021-22205 POC详情
12 None https://github.com/hh-hunter/cve-2021-22205 POC详情
13 Automated Gitlab RCE via CVE-2021-22205 https://github.com/X1pe0/Automated-Gitlab-RCE POC详情
14 Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution https://github.com/runsel/GitLab-CVE-2021-22205- POC详情
15 None https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner POC详情
16 GitLab CE/EE Preauth RCE using ExifTool https://github.com/inspiringz/CVE-2021-22205 POC详情
17 A CVE-2021-22205 Gitlab RCE POC written in Golang https://github.com/pizza-power/Golang-CVE-2021-22205-POC POC详情
18 NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nse https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse POC详情
19 CVE-2021-22205 的批量检测脚本 https://github.com/w0x68y/Gitlab-CVE-2021-22205 POC详情
20 None https://github.com/al4xs/CVE-2021-22205-gitlab POC详情
21 None https://github.com/honypot/CVE-2021-22205 POC详情
22 GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205 https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated- POC详情
23 CVE-2021-22205 检测脚本,支持getshell和命令执行 https://github.com/keven1z/CVE-2021-22205 POC详情
24 None https://github.com/hhhotdrink/CVE-2021-22205 POC详情
25 None https://github.com/sei-fish/CVE-2021-22205 POC详情
26 None https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205 POC详情
27 None https://github.com/Hikikan/CVE-2021-22205 POC详情
28 A simple bash script that exploits CVE-2021-22205 against vulnerable instances of gitlab https://github.com/NukingDragons/gitlab-cve-2021-22205 POC详情
29 CVE-2021-22205 exploit script https://github.com/cc3305/CVE-2021-22205 POC详情
30 Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205 https://github.com/ZZ-SOCMAP/CVE-2021-22205 POC详情
31 None https://github.com/osungjinwoo/CVE-2021-22205-gitlab POC详情
32 GitLab CE/EE contains a vulnreability which allows a specially crafted image passed to a file parser to perform a command execution attack. Versions impacted are between 11.9-13.8.7, 13.9-13.9.5, and 13.10-13.10.2. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/gitlab/gitlab-rce.yaml POC详情
33 GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-<hash>.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22205.yaml POC详情
34 None https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GitLab%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-22205.md POC详情
35 https://github.com/vulhub/vulhub/blob/master/gitlab/CVE-2021-22205/README.md POC详情
三、漏洞 CVE-2021-22205 的情报信息