Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0. | https://github.com/Occamsec/CVE-2023-2825 | POC Details |
| 2 | CVE-2023-2825 list | https://github.com/yuimarudev/CVE-2023-2825 | POC Details |
| 3 | the proof of concept written in Python for an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical severity issue | https://github.com/Tornad0007/CVE-2023-2825-Gitlab | POC Details |
| 4 | On May 23, 2023 GitLab released version 16.0.1 which fixed a critical vulnerability, CVE-2023-2825, affecting the Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. The vulnerability allows unauthenticated users to read arbitrary files through a path traversal bug. | https://github.com/Rubikcuv5/CVE-2023-2825 | POC Details |
| 5 | None | https://github.com/caopengyan/CVE-2023-2825 | POC Details |
| 6 | CVE-2023-2825 exploit script | https://github.com/cc3305/CVE-2023-2825 | POC Details |
| 7 | An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-2825.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet