[ { "id": 645357440, "name": "CVE-2023-2825", "full_name": "Occamsec\/CVE-2023-2825", "owner": { "login": "Occamsec", "id": 55592824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55592824?v=4", "html_url": "https:\/\/github.com\/Occamsec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Occamsec\/CVE-2023-2825", "description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.", "fork": false, "created_at": "2023-05-25T13:25:10Z", "updated_at": "2024-09-14T08:09:37Z", "pushed_at": "2023-06-02T12:10:06Z", "stargazers_count": 142, "watchers_count": 142, "has_discussions": false, "forks_count": 32, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-2825", "gitlab" ], "visibility": "public", "forks": 32, "watchers": 142, "score": 0, "subscribers_count": 4 }, { "id": 646319872, "name": "CVE-2023-2825", "full_name": "yuimarudev\/CVE-2023-2825", "owner": { "login": "yuimarudev", "id": 68449029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68449029?v=4", "html_url": "https:\/\/github.com\/yuimarudev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yuimarudev\/CVE-2023-2825", "description": "CVE-2023-2825 list", "fork": false, "created_at": "2023-05-28T02:14:37Z", "updated_at": "2023-05-28T02:14:37Z", "pushed_at": "2023-05-28T02:14:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 647150606, "name": "CVE-2023-2825-Gitlab", "full_name": "Tornad0007\/CVE-2023-2825-Gitlab", "owner": { "login": "Tornad0007", "id": 93181695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93181695?v=4", "html_url": "https:\/\/github.com\/Tornad0007", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tornad0007\/CVE-2023-2825-Gitlab", "description": "the proof of concept written in Python for an unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical severity issue ", "fork": false, "created_at": "2023-05-30T07:03:19Z", "updated_at": "2023-05-30T07:05:44Z", "pushed_at": "2023-05-30T07:05:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 649827572, "name": "CVE-2023-2825", "full_name": "Rubikcuv5\/CVE-2023-2825", "owner": { "login": "Rubikcuv5", "id": 47946047, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47946047?v=4", "html_url": "https:\/\/github.com\/Rubikcuv5", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Rubikcuv5\/CVE-2023-2825", "description": "On May 23, 2023 GitLab released version 16.0.1 which fixed a critical vulnerability, CVE-2023-2825, affecting the Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. The vulnerability allows unauthenticated users to read arbitrary files through a path traversal bug.", "fork": false, "created_at": "2023-06-05T18:16:51Z", "updated_at": "2023-06-19T21:41:12Z", "pushed_at": "2023-06-17T01:22:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 689671335, "name": "CVE-2023-2825", "full_name": "caopengyan\/CVE-2023-2825", "owner": { "login": "caopengyan", "id": 87455626, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87455626?v=4", "html_url": "https:\/\/github.com\/caopengyan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/caopengyan\/CVE-2023-2825", "description": null, "fork": false, "created_at": "2023-09-10T14:51:30Z", "updated_at": "2023-09-10T14:52:52Z", "pushed_at": "2023-09-10T15:36:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 817964661, "name": "CVE-2023-2825", "full_name": "cc3305\/CVE-2023-2825", "owner": { "login": "cc3305", "id": 103961201, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4", "html_url": "https:\/\/github.com\/cc3305", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cc3305\/CVE-2023-2825", "description": "CVE-2023-2825 exploit script", "fork": false, "created_at": "2024-06-20T20:22:01Z", "updated_at": "2024-07-27T20:19:49Z", "pushed_at": "2024-07-27T20:19:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]