Merge pull request #348 from alixthegreat/such-a-git

Such a git lab
This commit is contained in:
Cliffe
2025-12-08 22:29:51 +00:00
committed by GitHub
2 changed files with 8 additions and 9 deletions

View File

@@ -2,14 +2,13 @@
<vulnerability xmlns="http://www.github/cliffe/SecGen/vulnerability"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/vulnerability">
<name>Gitlist 0.4.0 RCE</name>
<author>Thomas Shaw</author>
<module_license>MIT</module_license>
<description>
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file
name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to
blame/master/, master/, and stats/master/.
Gitlist versions 0.6 and below are vulnerable to an exploit where the attacker is able to bypass/exploit the
'escapeshellarg' using argument injection, resulting in remote code execution.
</description>
<type>webapp</type>
@@ -48,13 +47,13 @@
</default_input>
<!--optional vulnerability details-->
<cve>CVE-2014-4511</cve>
<cve>CVE-2018-1000533</cve>
<cvss_base_score>7.5</cvss_base_score>
<cvss_vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
<cvss_base_score>9.8</cvss_base_score>
<cvss_vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</cvss_vector>
<!--optional hints-->
<msf_module>exploit/linux/http/gitlist_exec</msf_module>
<msf_module>exploit/multi/http/gitlist_arg_injection</msf_module>
<hint>Visit the webapp in a browser at: ip:80/gitlist </hint>
<!-- can't live alongside other web sites, since they it accepts any virtual host name -->

View File

@@ -103,7 +103,7 @@
<system>
<system_name>web_server</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>
<base distro="Debian 12" type="desktop" name="KDE"/>
<input into_datastore="organisation">
<encoder type="line_selector">