CVE-2023-2825
GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0.
How to download and setup CVE-2023-2825
Open terminal and run command
git clone https://github.com/Occamsec/CVE-2023-2825.git
git clone is used to create a copy or clone of CVE-2023-2825 repositories.
You pass git clone a repository URL. it supports a few different network protocols and corresponding URL formats.
Also you may download zip file with CVE-2023-2825 https://github.com/Occamsec/CVE-2023-2825/archive/master.zip
Or simply clone CVE-2023-2825 with SSH
[email protected]:Occamsec/CVE-2023-2825.git
If you have some problems with CVE-2023-2825
You may open issue on CVE-2023-2825 support forum (system) here: https://github.com/Occamsec/CVE-2023-2825/issuesSimilar to CVE-2023-2825 repositories
Here you may see CVE-2023-2825 alternatives and analogs
gitlabhq gitea docker-gitlab node-build-monitor release-it stackedit git-deploy git-auto-deploy Linux-Tutorial ansible-playbooks grav-plugin-git-sync git-repo renovate danger Git-for-bio-scientists shell notes git-updater git-open git-webhook integram python-gitlab gitlab reviewdog tox gitlab-mirrors Client kanban git-chglog gitlab-ce-zh