# N/A
## 漏洞概述
GitLab CE/EE中发现了一个漏洞,该漏洞导致未能正确验证传递给文件解析器的图像文件,从而导致远程命令执行。
## 影响版本
所有从11.9版本开始的GitLab CE/EE版本。
## 漏洞细节
GitLab在处理传递给文件解析器的图像文件时未能进行充分验证,这可能导致攻击者利用此漏洞执行远程命令。
## 漏洞影响
攻击者可以利用此漏洞执行任意命令,危及系统的安全性和完整性。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/mr-r3bot/Gitlab-CVE-2021-22205 | POC详情 |
2 | Pocsuite3 For CVE-2021-22205 | https://github.com/XTeam-Wing/CVE-2021-22205 | POC详情 |
3 | CVE-2021-22205 Unauthorized RCE | https://github.com/r0eXpeR/CVE-2021-22205 | POC详情 |
4 | Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205 | https://github.com/antx-code/CVE-2021-22205 | POC详情 |
5 | CVE-2021-22205& GitLab CE/EE RCE | https://github.com/Al1ex/CVE-2021-22205 | POC详情 |
6 | CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖,可在win平台使用 | https://github.com/whwlsfb/CVE-2021-22205 | POC详情 |
7 | PoC in single line bash | https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205 | POC详情 |
8 | CVE-2021-22205未授权漏洞批量检测与利用工具 | https://github.com/Seals6/CVE-2021-22205 | POC详情 |
9 | CVE-2021-22205 RCE | https://github.com/c0okB/CVE-2021-22205 | POC详情 |
10 | CVE-2021-22205-getshell | https://github.com/shang159/CVE-2021-22205-getshell | POC详情 |
11 | CVE-2021-22205& GitLab CE/EE RCE | https://github.com/devdanqtuan/CVE-2021-22205 | POC详情 |
12 | None | https://github.com/hh-hunter/cve-2021-22205 | POC详情 |
13 | Automated Gitlab RCE via CVE-2021-22205 | https://github.com/X1pe0/Automated-Gitlab-RCE | POC详情 |
14 | Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution | https://github.com/runsel/GitLab-CVE-2021-22205- | POC详情 |
15 | None | https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner | POC详情 |
16 | GitLab CE/EE Preauth RCE using ExifTool | https://github.com/inspiringz/CVE-2021-22205 | POC详情 |
17 | A CVE-2021-22205 Gitlab RCE POC written in Golang | https://github.com/pizza-power/Golang-CVE-2021-22205-POC | POC详情 |
18 | NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nse | https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse | POC详情 |
19 | CVE-2021-22205 的批量检测脚本 | https://github.com/w0x68y/Gitlab-CVE-2021-22205 | POC详情 |
20 | None | https://github.com/al4xs/CVE-2021-22205-gitlab | POC详情 |
21 | None | https://github.com/honypot/CVE-2021-22205 | POC详情 |
22 | GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205 | https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated- | POC详情 |
23 | CVE-2021-22205 检测脚本,支持getshell和命令执行 | https://github.com/keven1z/CVE-2021-22205 | POC详情 |
24 | None | https://github.com/hhhotdrink/CVE-2021-22205 | POC详情 |
25 | None | https://github.com/sei-fish/CVE-2021-22205 | POC详情 |
26 | None | https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205 | POC详情 |
27 | None | https://github.com/Hikikan/CVE-2021-22205 | POC详情 |
28 | A simple bash script that exploits CVE-2021-22205 against vulnerable instances of gitlab | https://github.com/NukingDragons/gitlab-cve-2021-22205 | POC详情 |
29 | CVE-2021-22205 exploit script | https://github.com/cc3305/CVE-2021-22205 | POC详情 |
30 | Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205 | https://github.com/ZZ-SOCMAP/CVE-2021-22205 | POC详情 |
31 | None | https://github.com/osungjinwoo/CVE-2021-22205-gitlab | POC详情 |
32 | GitLab CE/EE contains a vulnreability which allows a specially crafted image passed to a file parser to perform a command execution attack. Versions impacted are between 11.9-13.8.7, 13.9-13.9.5, and 13.10-13.10.2. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/gitlab/gitlab-rce.yaml | POC详情 |
33 | GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-<hash>.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22205.yaml | POC详情 |
34 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GitLab%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-22205.md | POC详情 |
35 | https://github.com/vulhub/vulhub/blob/master/gitlab/CVE-2021-22205/README.md | POC详情 |
暂无评论