Loading...

Gitea RCE via fake JWT, race condition and git hooks chain

In Summary : First, we use the error in the GIT LFS implementation to get the contents of the app.ini file. Then, from this file we re...

In Summary :

First, we use the error in the GIT LFS implementation to get the contents of the app.ini file.
Then, from this file we read SECRET that can be used to sign JWT tokens.
Thanks to that, we are able to send a falsified session file of a user.
We create a new repository using our newly created administrator session. We need an administrator account because only the administrator can modify git hooks.
The update hook is going to contain our malicious code to be executed on the server.
Then, all that is needed to run this code is to just push any source code changes to the repository.
We already know how in theory the server attack will look like. Now I will discuss its individual elements in detail. [...]

kindly refer the following link as follow up :
https://ift.tt/2KMLlHS

Post a Comment

emo-but-icon

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats