Skip to content

Conversation

@alixthegreat
Copy link

Addition of a new scenario as requested.

Scenario contains an instance of gitlab ce version 13.10.2 on the web server. A flag is pre leaked in robots.txt. This version is vulnerable to CVE-2021-22205 which can be exploited to get a shell as the git user. Upon exploiting and getting a shell, the user can traverse to /home/git and there is a hidden .credentials file containing a login for the gitlab site. Upon doing so they will see a repository titled dev_notes. A flag can then be found in the previous commit. The server also contains an apt get priv esc vulnerability in order to find the final flag in the root directory.

In future it could be amended to allow for a port to be passed as a parameter, but during my testing it threw an error 502 so I kept it as default of 80. There is also potential for the files on the gitlab repo to be more personalised, for example if an organisation is passed in it could contain specific names or information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant