🎯 Want to practice with the new gitlab CVE ? Follow the instructions
- Install Docker : https://docs.docker.com/get-docker/
- Clone the project :
git clone https://github.com/Trackflaw/CVE-2023-7028-Docker.git
. - Go to the project :
cd CVE-2023-7028-Docker
- Configure the Gitlab SMTP on
docker-compose.yml
. - Change
external_url 'http://gitlab.domain.com'
andhostname: 'gitlab.domain.com'
with your domain (internal/external no care). - Launch the Docker Compose file :
docker compose up -d
. - Connect on
http://localhost
- Username :
admin
- Password :
Tr4ckfl4w4th3W1n
- Username :
- Create an account to compromise with a valid mail adress.
A Proof of Concept video is available on Trackflaw blog : https://blog.trackflaw.com/en/compromise-gitlab-accounts-with-cve-2023-7028/
Many PoCs are available online to automate the exploitation of this vulnerability:
- Made by a talented French enthusiast: https://github.com/Vozec/CVE-2023-7028
- https://github.com/V1lu0/CVE-2023-7028