Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-22205
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GitLab 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GitLab是美国GitLab公司的一个开源的端到端软件开发平台,具有内置的版本控制、问题跟踪、代码审查、CI/CD(持续集成和持续交付)等功能。 Gitlab Community Edition 存在代码注入漏洞,该漏洞源于图像解析器在处理图像文件时输入验证不正确。以下产品及版本受到影响::Gitlab Community Edition: 11.9.0, 11.9.1, 11.9.2, 11.9.3, 11.9.4, 11.9.5, 11.9.6, 11.9.7, 11.9.8, 11.9.9, 11
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
GitLabGitLab >=11.9, <13.8.8 -
II. Public POCs for CVE-2021-22205
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/mr-r3bot/Gitlab-CVE-2021-22205POC Details
2Pocsuite3 For CVE-2021-22205https://github.com/XTeam-Wing/CVE-2021-22205POC Details
3CVE-2021-22205 Unauthorized RCEhttps://github.com/r0eXpeR/CVE-2021-22205POC Details
4Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205https://github.com/antx-code/CVE-2021-22205POC Details
5CVE-2021-22205& GitLab CE/EE RCEhttps://github.com/Al1ex/CVE-2021-22205POC Details
6CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖,可在win平台使用https://github.com/whwlsfb/CVE-2021-22205POC Details
7PoC in single line bashhttps://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205POC Details
8CVE-2021-22205未授权漏洞批量检测与利用工具https://github.com/Seals6/CVE-2021-22205POC Details
9CVE-2021-22205 RCE https://github.com/c0okB/CVE-2021-22205POC Details
10CVE-2021-22205-getshellhttps://github.com/shang159/CVE-2021-22205-getshellPOC Details
11CVE-2021-22205& GitLab CE/EE RCEhttps://github.com/devdanqtuan/CVE-2021-22205POC Details
12Nonehttps://github.com/hh-hunter/cve-2021-22205POC Details
13Automated Gitlab RCE via CVE-2021-22205https://github.com/X1pe0/Automated-Gitlab-RCEPOC Details
14Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Executionhttps://github.com/runsel/GitLab-CVE-2021-22205-POC Details
15Nonehttps://github.com/faisalfs10x/GitLab-CVE-2021-22205-scannerPOC Details
16GitLab CE/EE Preauth RCE using ExifToolhttps://github.com/inspiringz/CVE-2021-22205POC Details
17A CVE-2021-22205 Gitlab RCE POC written in Golanghttps://github.com/pizza-power/Golang-CVE-2021-22205-POCPOC Details
18NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nsehttps://github.com/DIVD-NL/GitLab-cve-2021-22205-nsePOC Details
19CVE-2021-22205 的批量检测脚本https://github.com/w0x68y/Gitlab-CVE-2021-22205POC Details
20Nonehttps://github.com/al4xs/CVE-2021-22205-gitlabPOC Details
21Nonehttps://github.com/honypot/CVE-2021-22205POC Details
22GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-POC Details
23CVE-2021-22205 检测脚本,支持getshell和命令执行https://github.com/keven1z/CVE-2021-22205POC Details
24Nonehttps://github.com/hhhotdrink/CVE-2021-22205POC Details
25Nonehttps://github.com/sei-fish/CVE-2021-22205POC Details
26Nonehttps://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205POC Details
27Nonehttps://github.com/Hikikan/CVE-2021-22205POC Details
28A simple bash script that exploits CVE-2021-22205 against vulnerable instances of gitlabhttps://github.com/NukingDragons/gitlab-cve-2021-22205POC Details
29CVE-2021-22205 exploit scripthttps://github.com/cc3305/CVE-2021-22205POC Details
30Gitlab CE/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205https://github.com/ZZ-SOCMAP/CVE-2021-22205POC Details
31Nonehttps://github.com/osungjinwoo/CVE-2021-22205-gitlabPOC Details
32GitLab CE/EE contains a vulnreability which allows a specially crafted image passed to a file parser to perform a command execution attack. Versions impacted are between 11.9-13.8.7, 13.9-13.9.5, and 13.10-13.10.2.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/gitlab/gitlab-rce.yamlPOC Details
33GitLab CE/EE starting from 11.9 does not properly validate image files that were passed to a file parser, resulting in a remote command execution vulnerability. This template attempts to passively identify vulnerable versions of GitLab without the need for an exploit by matching unique hashes for the application-<hash>.css file in the header for unauthenticated requests. Positive matches do not guarantee exploitability. Tooling to find relevant hashes based on the semantic version ranges specified in the CVE is linked in the references section below.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-22205.yamlPOC Details
34Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GitLab%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-22205.mdPOC Details
35https://github.com/vulhub/vulhub/blob/master/gitlab/CVE-2021-22205/README.mdPOC Details
36CVE-2021-22205& GitLab CE/EE RCEhttps://github.com/ccordeiro/CVE-2021-22205POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-22205
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-22205

No comments yet


Leave a comment