-
Notifications
You must be signed in to change notification settings - Fork 33
CVE-2012-2122 #42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
CVE-2012-2122 #42
Conversation
olegbck
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CVE-2012-2122 seems to be working, I see the "Exploit Success!" message. CVE-2021-22205 doesn't work, see my comments.
| dest: /opt/CVE-2021-22205/ | ||
|
|
||
| - name: Load GitLab Docker image | ||
| command: docker load -i /opt/CVE-2021-22205/gitlab-13.10.1.tar |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please use built-in commands to access Docker
| command: docker load -i /opt/CVE-2021-22205/gitlab-13.10.1.tar | ||
|
|
||
| - name: Start Docker Compose services | ||
| command: docker compose up -d --build |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please use built-in commands to access Docker
|
|
||
| - name: Copy CVE-2021-22205 | ||
| ansible.builtin.copy: | ||
| src: ./data/ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We only need to copy poc.py. Otherwise we end up copying gitlab-13.10.1.tar which is 2.6GB. The execution will run longer and create bigger snapshots.
| playbook: ubuntu2.yml | ||
| command: | ||
| - "sleep 180" | ||
| - "python /opt/CVE-2021-22205/poc.py http://ubuntu1:8080 \"touch /tmp/success\"" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It shows to me:
2025-01-03 15:47:09,035 - CRITICAL - [main] Command failed: <UnexpectedExit: cmd='python /opt/CVE-2021-22205/poc.py http://ubuntu1:8080 "touch /tmp/success"' exited=1>
| ubuntu1: | ||
| playbook: ubuntu1.yml | ||
| command: | ||
| - "ls /tmp/success" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It shows to me:
2025-01-03 15:47:09,178 - CRITICAL - [main] Command failed: <UnexpectedExit: cmd='ls /tmp/success' exited=2>
Used to reproduce CVE-2012-2122. Can successfully log into MySQL and execute statements without needing a password.