GitLab 11.4.7 Remote Code Execution - Real World CTF 2018

GitLab 11.4.7 Remote Code Execution - Real World CTF 2018

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=LrLJuyAdoAg



Duration: 14:03
141,838 views
4,387


Video write-up about the Real World CTF challenge "flaglab" that involved exploiting a gitlab 1day. Actually two CVEs are combined to achieve full remote code execution:

CVE-2018-19571 (SSRF) + CVE-2018-19585 (CRLF) = RCE

flaglab - docker-compose: https://gist.github.com/LiveOverflow/8bf92dd86e5c481fb484af83c64e83b3#file-docker-compose-yml
Release: https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

#CTF #CVE







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
ssrf
crlf
newline
injection
server-side
request forgery
redis
gitlab
flaglab
gitlab import
github
git
webshell
rce
code execution
ctf
capture the flag
writeup
write-up
11.4.7
redis to ssrf
shell worker
broker
exploit redis
docker
setup