8000 GitHub - wuhan005/CVE-2022-30781: 🍵 Gitea repository migration remote command execution exploit.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

wuhan005/CVE-2022-30781

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

🍵 CVE-2022-30781

Gitea repository migration remote command execution exploit.

How to use

  1. Run an HTTP filesystem server with the files in this repository.
  2. Edit the command to be exeucted in api/v1/repos/e99/exp/pulls/1/index.html L96.
  3. Migrate remote repository with URL http://<your_host>/e99/exp on the Gitea instance.
  4. Pwnned!

Reference

https://tttang.com/archive/1607/ (Chinese)

Credit

@wuhan005 @Li4n0 from Vidar-Team

This repository is only for security researches/teaching purposes, use at your own risk!

About

🍵 Gitea repository migration remote command execution exploit.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0