2023-05-25 20:32:20 +02:00
[
{
"id" : 645357440 ,
"name" : "CVE-2023-2825" ,
"full_name" : "Occamsec\/CVE-2023-2825" ,
"owner" : {
"login" : "Occamsec" ,
"id" : 55592824 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55592824?v=4" ,
"html_url" : "https:\/\/github.com\/Occamsec"
} ,
"html_url" : "https:\/\/github.com\/Occamsec\/CVE-2023-2825" ,
"description" : "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0." ,
"fork" : false ,
"created_at" : "2023-05-25T13:25:10Z" ,
2023-08-12 02:25:09 +02:00
"updated_at" : "2023-08-11T23:10:31Z" ,
2023-06-02 14:32:52 +02:00
"pushed_at" : "2023-06-02T12:10:06Z" ,
2023-08-12 02:25:09 +02:00
"stargazers_count" : 137 ,
"watchers_count" : 137 ,
2023-05-25 20:32:20 +02:00
"has_discussions" : false ,
2023-07-24 15:57:27 +02:00
"forks_count" : 31 ,
2023-05-25 20:32:20 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-2825" ,
"gitlab"
] ,
"visibility" : "public" ,
2023-07-24 15:57:27 +02:00
"forks" : 31 ,
2023-08-12 02:25:09 +02:00
"watchers" : 137 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 4
2023-05-28 08:28:30 +02:00
} ,
{
"id" : 646319872 ,
"name" : "CVE-2023-2825" ,
"full_name" : "yuimarudev\/CVE-2023-2825" ,
"owner" : {
"login" : "yuimarudev" ,
"id" : 68449029 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68449029?v=4" ,
"html_url" : "https:\/\/github.com\/yuimarudev"
} ,
"html_url" : "https:\/\/github.com\/yuimarudev\/CVE-2023-2825" ,
"description" : "CVE-2023-2825 list" ,
"fork" : false ,
"created_at" : "2023-05-28T02:14:37Z" ,
"updated_at" : "2023-05-28T02:14:37Z" ,
"pushed_at" : "2023-05-28T02:14:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-06 08:36:07 +02:00
"subscribers_count" : 1
2023-05-30 14:30:30 +02:00
} ,
{
"id" : 647150606 ,
"name" : "CVE-2023-2825-Gitlab" ,
"full_name" : "Tornad0007\/CVE-2023-2825-Gitlab" ,
"owner" : {
"login" : "Tornad0007" ,
"id" : 93181695 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/93181695?v=4" ,
"html_url" : "https:\/\/github.com\/Tornad0007"
} ,
"html_url" : "https:\/\/github.com\/Tornad0007\/CVE-2023-2825-Gitlab" ,
"description" : "the proof of concept written in Python for an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical severity issue " ,
"fork" : false ,
"created_at" : "2023-05-30T07:03:19Z" ,
"updated_at" : "2023-05-30T07:05:44Z" ,
"pushed_at" : "2023-05-30T07:05:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-31 08:30:11 +02:00
"forks_count" : 1 ,
2023-05-30 14:30:30 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-31 08:30:11 +02:00
"forks" : 1 ,
2023-05-30 14:30:30 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-06 08:36:07 +02:00
"subscribers_count" : 1
2023-06-05 20:37:28 +02:00
} ,
2023-06-20 02:25:53 +02:00
{
"id" : 649827572 ,
"name" : "CVE-2023-2825" ,
"full_name" : "EmmanuelCruzL\/CVE-2023-2825" ,
"owner" : {
"login" : "EmmanuelCruzL" ,
"id" : 47946047 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47946047?v=4" ,
"html_url" : "https:\/\/github.com\/EmmanuelCruzL"
} ,
"html_url" : "https:\/\/github.com\/EmmanuelCruzL\/CVE-2023-2825" ,
"description" : "On May 23, 2023 GitLab released version 16.0.1 which fixed a critical vulnerability, CVE-2023-2825, affecting the Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. The vulnerability allows unauthenticated users to read arbitrary files through a path traversal bug." ,
"fork" : false ,
"created_at" : "2023-06-05T18:16:51Z" ,
"updated_at" : "2023-06-19T21:41:12Z" ,
"pushed_at" : "2023-06-17T01:22:26Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-06-20 08:24:22 +02:00
"subscribers_count" : 1
2023-05-25 20:32:20 +02:00
}
]