9.9
CVSSv3

CVE-2022-2992

Published: 17/10/2022 Updated: 08/08/2023
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 0

Vulnerability Summary

A vulnerability in GitLab CE/EE affecting all versions from 11.10 before 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitlab gitlab

Exploits

An authenticated user can import a repository from GitHub into GitLab If a user attempts to import a repo from an attacker-controlled server, the server will reply with a Redis serialization protocol object in the nested default_branch GitLab will cache this object and then deserialize it when trying to load a user session, resulting in remote co ...

Github Repositories

CVE-2022-2992 Authenticated Remote Command Execution in Gitlab via GitHub import A vulnerability in GitLab CE/EE affecting all versions from 1110 before 1516, all versions starting from 152 before 1524, all versions starting from 153 before 1532 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint aboutgitl

Authenticated Remote Command Execution in Gitlab via GitHub import.

CVE-2022-2992 Authenticated Remote Command Execution in Gitlab via GitHub import A vulnerability in GitLab CE/EE affecting all versions from 1110 before 1516, all versions starting from 152 before 1524, all versions starting from 153 before 1532 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint aboutgitl

A collection of proof-of-concept exploit scripts written by the team at Redway Security for various CVEs.

Redway CVE Proof-of-Concept Exploits A collection of proof-of-concept exploit scripts written by the team at Redway Security for various CVEs CVE-2022-2992: Remote Command Execution via Github import CVE-2023-32707: Splunk 'edit_user' Capability Privilege Escalation DISCLAIMER This Git repository contains code, scripts, and documentation related to security exploit

Our writeups for NTO 2024:D

Task-Based Web Web1 Замечаем, что на сайте присутствует уязвимость Path Traversal Так как в file1txt есть подсказка об /etc/secret, с помощью уязвимости открываем данный файл Exploit: curl 1921681210:5001/download?file_type=//////etc/secret

Authenticated Remote Command Execution in Gitlab via GitHub import

CVE-2022-2992 Authenticated Remote Command Execution in Gitlab via GitHub import A vulnerability in GitLab CE/EE affecting all versions from 1110 before 1516, all versions starting from 152 before 1524, all versions starting from 153 before 1532 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint aboutgitl