POC详情: 9fc10773fde434bf1c909656187fb71f78380e36

来源
关联漏洞
标题: GitLab 安全漏洞 (CVE-2023-7028)
描述:GitLab是美国GitLab公司的一个开源的端到端软件开发平台,具有内置的版本控制、问题跟踪、代码审查、CI/CD(持续集成和持续交付)等功能。 GitLab 存在安全漏洞,该漏洞源于用户帐户密码重置电子邮件可能会发送到未经验证的电子邮件地址。
描述
CVE-2023-7028
介绍
# CVE-2023-7028

Gitlab CVE-2023-7028: Account Takeover via Password Reset without user interactions

A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords.

While also vulnerable, users who have two-factor authentication enabled on their account are safe from account takeover. Also LDAP logins are safe too!

### About CVE-2023-7028

CVE-2023-7028 affects GitLab self-managed instances running GitLab Community Edition (CE) and Enterprise Edition (EE) versions:

    * 16.1 prior to 16.1.5
    * 16.2 prior to 16.2.8
    * 16.3 prior to 16.3.6
    * 16.4 prior to 16.4.4
    * 16.5 prior to 16.5.6
    * 16.6 prior to 16.6.4
    * 16.7 prior to 16.7.2


How to use
---

```
usage: CVE-2023-7028.py [-h] [-u URL] -v VICTIM -a ATTACKER [-p PROXY]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     URL of host to check will need http or https
  -v VICTIM, --victim VICTIM
                        victim email address
  -a ATTACKER, --attacker ATTACKER
                        attacker email address
  -p PROXY, --proxy PROXY
                        Proxy for debugging
```
文件快照

[4.0K] /data/pocs/9fc10773fde434bf1c909656187fb71f78380e36 ├── [2.6K] CVE-2023-7028.py └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。