Files
vulhub/gitlab/CVE-2016-9086/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

32 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# GitLab 任意文件读取漏洞CVE-2016-9086
GitLab是一款Ruby开发的Git项目管理平台。在8.9版本后添加的“导出、导入项目”功能,因为没有处理好压缩包中的软连接,已登录用户可以利用这个功能读取服务器上的任意文件。
参考链接:
- https://about.gitlab.com/releases/2016/11/02/cve-2016-9086-patches/
- https://hackerone.com/reports/178152
- http://paper.seebug.org/104/
## 测试环境
执行如下命令启动一个GitLab Community Server 8.13.1
```
docker compose up -d
```
环境运行后,访问`http://your-ip:8080`即可查看GitLab主页其ssh端口为10022默认管理员账号、密码是`root``vulhub123456`
> 注意请使用2G及以上内存的VPS或虚拟机运行该环境实测1G内存的机器无法正常运行GitLab运行后502错误
## 漏洞复现
注册并登录用户,新建一个项目,点击`GitLab export`
![](2.png)
在导入页面,将[test.tar.gz](test.tar.gz)上传,将会读取到`/etc/passwd`文件内容:
![](1.png)