Lucene search

K
packetstormStacksmashing, GreenwolfPACKETSTORM:166828
HistoryApr 26, 2022 - 12:00 a.m.

Gitlab 14.9 Authentication Bypass

2022-04-2600:00:00
stacksmashing, Greenwolf
packetstormsecurity.com
158

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

`# Exploit Title: Gitlab 14.9 - Authentication Bypass  
# Date: 12/04/2022  
# Exploit Authors: Greenwolf & stacksmashing  
# Vendor Homepage: https://about.gitlab.com/  
# Software Link: https://about.gitlab.com/install  
# Version: GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2  
# Tested on: Linux  
# CVE : CVE-2022-1162  
# References: https://github.com/Greenwolf/CVE-2022-1162  
  
A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts.  
  
Exploit:  
  
New Gitlab Accounts (created since the first affect version and if Gitlab is before the patched version) can be logged into with the following password:  
  
123qweQWE!@#000000000  
  
`

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P