Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/mr-r3bot/Gitlab-CVE-2021-22205 | POC Details |
| 2 | Pocsuite3 For CVE-2021-22205 | https://github.com/XTeam-Wing/CVE-2021-22205 | POC Details |
| 3 | CVE-2021-22205 Unauthorized RCE | https://github.com/r0eXpeR/CVE-2021-22205 | POC Details |
| 4 | Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205 | https://github.com/antx-code/CVE-2021-22205 | POC Details |
| 5 | CVE-2021-22205& GitLab CE/EE RCE | https://github.com/Al1ex/CVE-2021-22205 | POC Details |
| 6 | CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖,可在win平台使用 | https://github.com/whwlsfb/CVE-2021-22205 | POC Details |
| 7 | PoC in single line bash | https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205 | POC Details |
| 8 | CVE-2021-22205未授权漏洞批量检测与利用工具 | https://github.com/Seals6/CVE-2021-22205 | POC Details |
| 9 | CVE-2021-22205 RCE | https://github.com/c0okB/CVE-2021-22205 | POC Details |
| 10 | CVE-2021-22205-getshell | https://github.com/shang159/CVE-2021-22205-getshell | POC Details |
| 11 | CVE-2021-22205& GitLab CE/EE RCE | https://github.com/devdanqtuan/CVE-2021-22205 | POC Details |
| 12 | None | https://github.com/hh-hunter/cve-2021-22205 | POC Details |
| 13 | Automated Gitlab RCE via CVE-2021-22205 | https://github.com/X1pe0/Automated-Gitlab-RCE | POC Details |
| 14 | Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution | https://github.com/runsel/GitLab-CVE-2021-22205- | POC Details |
| 15 | None | https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner | POC Details |
| 16 | GitLab CE/EE Preauth RCE using ExifTool | https://github.com/inspiringz/CVE-2021-22205 | POC Details |
| 17 | A CVE-2021-22205 Gitlab RCE POC written in Golang | https://github.com/pizza-power/Golang-CVE-2021-22205-POC | POC Details |
| 18 | NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nse | https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse | POC Details |
| 19 | CVE-2021-22205 的批量检测脚本 | https://github.com/w0x68y/Gitlab-CVE-2021-22205 | POC Details |
| 20 | None | https://github.com/al4xs/CVE-2021-22205-gitlab | POC Details |
| 21 | None | https://github.com/honypot/CVE-2021-22205 | POC Details |
| 22 | GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205 | https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated- | POC Details |
| 23 | CVE-2021-22205 检测脚本,支持getshell和命令执行 | https://github.com/keven1z/CVE-2021-22205 | POC Details |
| 24 | None | https://github.com/hhhotdrink/CVE-2021-22205 | POC Details |
| 25 | None | https://github.com/sei-fish/CVE-2021-22205 | POC Details |
| 26 | None | https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205 | POC Details |
| 27 | None | https://github.com/Hikikan/CVE-2021-22205 | POC Details |
| 28 | A simple bash script that exploits CVE-2021-22205 against vulnerable instances of gitlab | https://github.com/NukingDragons/gitlab-cve-2021-22205 | POC Details |
| 29 | CVE-2021-22205 exploit script | https://github.com/cc3305/CVE-2021-22205 | POC Details |
| 30 | Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205 | https://github.com/ZZ-SOCMAP/CVE-2021-22205 | POC Details |
| 31 | None | https://github.com/osungjinwoo/CVE-2021-22205-gitlab | POC Details |
| 32 | GitLab CE/EE contains a vulnreability which allows a specially crafted image passed to a file parser to perform a command execution attack. Versions impacted are between 11.9-13.8.7, 13.9-13.9.5, and 13.10-13.10.2. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/gitlab/gitlab-rce.yaml | POC Details |
| 33 | GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-<hash>.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22205.yaml | POC Details |
| 34 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GitLab%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-22205.md | POC Details |
| 35 | https://github.com/vulhub/vulhub/blob/master/gitlab/CVE-2021-22205/README.md | POC Details | |
| 36 | CVE-2021-22205& GitLab CE/EE RCE | https://github.com/ccordeiro/CVE-2021-22205 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet