目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2021-22205 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
GitLab 代码注入漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
GitLab是美国GitLab公司的一个开源的端到端软件开发平台,具有内置的版本控制、问题跟踪、代码审查、CI/CD(持续集成和持续交付)等功能。 Gitlab Community Edition 存在代码注入漏洞,该漏洞源于图像解析器在处理图像文件时输入验证不正确。以下产品及版本受到影响::Gitlab Community Edition: 11.9.0, 11.9.1, 11.9.2, 11.9.3, 11.9.4, 11.9.5, 11.9.6, 11.9.7, 11.9.8, 11.9.9, 11
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
GitLabGitLab >=11.9, <13.8.8 -
二、漏洞 CVE-2021-22205 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/mr-r3bot/Gitlab-CVE-2021-22205POC详情
2Pocsuite3 For CVE-2021-22205https://github.com/XTeam-Wing/CVE-2021-22205POC详情
3CVE-2021-22205 Unauthorized RCEhttps://github.com/r0eXpeR/CVE-2021-22205POC详情
4Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205https://github.com/antx-code/CVE-2021-22205POC详情
5CVE-2021-22205& GitLab CE/EE RCEhttps://github.com/Al1ex/CVE-2021-22205POC详情
6CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖,可在win平台使用https://github.com/whwlsfb/CVE-2021-22205POC详情
7PoC in single line bashhttps://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205POC详情
8CVE-2021-22205未授权漏洞批量检测与利用工具https://github.com/Seals6/CVE-2021-22205POC详情
9CVE-2021-22205 RCE https://github.com/c0okB/CVE-2021-22205POC详情
10CVE-2021-22205-getshellhttps://github.com/shang159/CVE-2021-22205-getshellPOC详情
11CVE-2021-22205& GitLab CE/EE RCEhttps://github.com/devdanqtuan/CVE-2021-22205POC详情
12Nonehttps://github.com/hh-hunter/cve-2021-22205POC详情
13Automated Gitlab RCE via CVE-2021-22205https://github.com/X1pe0/Automated-Gitlab-RCEPOC详情
14Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Executionhttps://github.com/runsel/GitLab-CVE-2021-22205-POC详情
15Nonehttps://github.com/faisalfs10x/GitLab-CVE-2021-22205-scannerPOC详情
16GitLab CE/EE Preauth RCE using ExifToolhttps://github.com/inspiringz/CVE-2021-22205POC详情
17A CVE-2021-22205 Gitlab RCE POC written in Golanghttps://github.com/pizza-power/Golang-CVE-2021-22205-POCPOC详情
18NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nsehttps://github.com/DIVD-NL/GitLab-cve-2021-22205-nsePOC详情
19CVE-2021-22205 的批量检测脚本https://github.com/w0x68y/Gitlab-CVE-2021-22205POC详情
20Nonehttps://github.com/al4xs/CVE-2021-22205-gitlabPOC详情
21Nonehttps://github.com/honypot/CVE-2021-22205POC详情
22GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-POC详情
23CVE-2021-22205 检测脚本,支持getshell和命令执行https://github.com/keven1z/CVE-2021-22205POC详情
24Nonehttps://github.com/hhhotdrink/CVE-2021-22205POC详情
25Nonehttps://github.com/sei-fish/CVE-2021-22205POC详情
26Nonehttps://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205POC详情
27Nonehttps://github.com/Hikikan/CVE-2021-22205POC详情
28A simple bash script that exploits CVE-2021-22205 against vulnerable instances of gitlabhttps://github.com/NukingDragons/gitlab-cve-2021-22205POC详情
29CVE-2021-22205 exploit scripthttps://github.com/cc3305/CVE-2021-22205POC详情
30Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205https://github.com/ZZ-SOCMAP/CVE-2021-22205POC详情
31Nonehttps://github.com/osungjinwoo/CVE-2021-22205-gitlabPOC详情
32GitLab CE/EE contains a vulnreability which allows a specially crafted image passed to a file parser to perform a command execution attack. Versions impacted are between 11.9-13.8.7, 13.9-13.9.5, and 13.10-13.10.2.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/gitlab/gitlab-rce.yamlPOC详情
33GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-<hash>.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22205.yamlPOC详情
34Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GitLab%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-22205.mdPOC详情
35https://github.com/vulhub/vulhub/blob/master/gitlab/CVE-2021-22205/README.mdPOC详情
36CVE-2021-22205& GitLab CE/EE RCEhttps://github.com/ccordeiro/CVE-2021-22205POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2021-22205 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-22205

暂无评论


发表评论