Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1162 PoC — GitLab Community Edition和GitLab Enterprise Edition 信任管理问题漏洞

Source
Associated Vulnerability
Title:GitLab Community Edition和GitLab Enterprise Edition 信任管理问题漏洞 (CVE-2022-1162)
Description:A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
Description
A simple tool to enumerate users in gitlab
Readme
# CVE-2022-1162

A GitLab TakeOver Tool

A simple tool to enumerate users in gitlab and login using CVE-2022-1162



### Google Dork
intitle:"Sign in · GitLab"


_____________

### Cmd
python code.py https://url.com

_____________


Pull Requests are Welcome!

File Snapshot

[4.0K] /data/pocs/b55f3eaf621ec645a9e8001c4871a7b66dae103c ├── [3.5K] code.py └── [ 262] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →