🍵 Gitea repository migration remote command execution exploit.# 🍵 CVE-2022-30781
Gitea repository migration remote command execution exploit.
## How to use
1. Run an HTTP filesystem server with the files in this repository.
2. Edit the command to be exeucted in `api/v1/repos/e99/exp/pulls/1/index.html L96`.
3. Migrate remote repository with URL `http://<your_host>/e99/exp` on the Gitea instance.
4. Pwnned!
## Reference
https://tttang.com/archive/1607/ (Chinese)
## Credit
[@wuhan005](https://github.com/wuhan005) [@Li4n0](https://github.com/li4n0) from Vidar-Team
**This repository is only for security researches/teaching purposes, use at your own risk!**
[4.0K] /data/pocs/93f5c25f7c16502134b019b2dd7885212d3249b6
├── [4.0K] api
│ └── [4.0K] v1
│ ├── [4.0K] repos
│ │ └── [4.0K] e99
│ │ └── [4.0K] exp
│ │ ├── [1.9K] index.html
│ │ ├── [4.0K] issues
│ │ │ └── [4.0K] 1
│ │ │ ├── [4.0K] comments
│ │ │ │ └── [ 2] index.html
│ │ │ └── [4.0K] reviews
│ │ │ └── [ 2] index.html
│ │ ├── [4.0K] pulls
│ │ │ ├── [4.0K] 1
│ │ │ │ └── [4.0K] reviews
│ │ │ │ └── [ 2] index.html
│ │ │ └── [6.9K] index.html
│ │ └── [4.0K] topics
│ │ └── [ 13] index.html
│ ├── [4.0K] settings
│ │ └── [4.0K] api
│ │ └── [ 116] index.html
│ └── [4.0K] version
│ └── [ 21] index.html
└── [ 610] README.md
16 directories, 9 files