Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10977 PoC — GitLab 路径遍历漏洞

Source
Associated Vulnerability
Title:GitLab 路径遍历漏洞 (CVE-2020-10977)
Description:GitLab是美国GitLab公司的一款使用Ruby on Rails开发的、自托管的、Git(版本控制系统)项目仓库应用程序。该程序可用于查阅项目的文件内容、提交历史、Bug列表等。 GitLab(企业版和社区版)12.9之前版本中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
Exploit for "GitLab Instance" Arbitrary server file read vulnerability
Readme
# Python Exploit for gitlab private instance arbitrary file read
At the date of 03/23/2020, a vulnerability report with its PoC was released in hackerone by **William Bowling**\
With this vulnerability we can read any world readable files (with permission 444 or more) on the gitlab server like /etc/passwd and so on... (worldreadable files only)\
```
Notice that you should be authenticated user
```

I've tested it on gitlab version 21.9.0 (ubuntu 18.04) but it's OS independent

# exploit-db
Many thanks to **exploit-db** team for publishing this exploit\
https://www.exploit-db.com/exploits/48431


# Credit
Many thanks to **William Bowling**\
vulnerability disclosed by : **William Bowling** of Biteable, a.k.a vakzz\
https://hackerone.com/reports/827052
File Snapshot

[4.0K] /data/pocs/e251df36457a715de541a4c56b83a96b91812516 ├── [ 760] README.md └── [7.9K] ReadServerFiles.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.