diff --git a/cve/gitlab/2023/CVE-2023-22490/HEAD b/cve/gitlab/2023/CVE-2023-22490/HEAD new file mode 100644 index 0000000000000000000000000000000000000000..421376db9e8aee847e9d774891e73098a7415e94 --- /dev/null +++ b/cve/gitlab/2023/CVE-2023-22490/HEAD @@ -0,0 +1 @@ +dummy diff --git a/cve/gitlab/2023/CVE-2023-22490/objects b/cve/gitlab/2023/CVE-2023-22490/objects new file mode 120000 index 0000000000000000000000000000000000000000..3594e94c04db171e2767224db355f514b13715c5 --- /dev/null +++ b/cve/gitlab/2023/CVE-2023-22490/objects @@ -0,0 +1 @@ +/etc/passwd \ No newline at end of file diff --git a/cve/gitlab/2023/CVE-2023-22490/test.txt b/cve/gitlab/2023/CVE-2023-22490/test.txt new file mode 100644 index 0000000000000000000000000000000000000000..9daeafb9864cf43055ae93beb0afd6c7d144bfa4 --- /dev/null +++ b/cve/gitlab/2023/CVE-2023-22490/test.txt @@ -0,0 +1 @@ +test diff --git a/cve/gitlab/2023/yaml/CVE-2023-22490.yaml b/cve/gitlab/2023/yaml/CVE-2023-22490.yaml new file mode 100644 index 0000000000000000000000000000000000000000..97ef37e914b8b1ab2bb61b70f92373312854435e --- /dev/null +++ b/cve/gitlab/2023/yaml/CVE-2023-22490.yaml @@ -0,0 +1,20 @@ +id: CVE-2023-22490 +source: https://github.com/smash8tap/CVE-2023-22490_PoC +info: + name: GitLab是由GitLab Inc.开发,一款基于Git的完全集成的软件开发平台。 + severity: 漏洞危害 + description: | + Git是一个修订控制系统。使用特制的存储库,版本2.39.2、2.38.4、2.37.6、2.36.5、2.35.7、2.34.7、2.33.7、2.32.6、2.31.7和2.30.8之前的Git即使在使用非本地传输时,也可以被诱骗使用其本地克隆优化。尽管Git会中止源“$Git_DIR/objects”目录包含符号链接的本地克隆,但“objects”目录本身可能仍然是符号链接。这两者可以组合在一起,以包括基于恶意存储库的工作副本中受害者文件系统上的已知路径的任意文件,从而允许以与CVE-2022-39253类似的方式进行数据泄露。 + scope-of-influence: + Git 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, 2.30.8 + reference: + - https://nvd.nist.gov/vuln/detail/cve-2023-22490 + - https://github.com/smash8tap/CVE-2023-22490_PoC + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N + cvss-score: 5.5 + cve-id: CVE-2023-22490 + cwe-id: CWE-59 + cnvd-id: None + kve-id: None + tags: Git, data exfiltration diff --git a/openkylin_list.yaml b/openkylin_list.yaml index a39bab918729fb12510cb76508e82d8d225740c6..a1268d4287a10fa4aa748d9b14840bc7950e0533 100644 --- a/openkylin_list.yaml +++ b/openkylin_list.yaml @@ -87,6 +87,7 @@ cve: - CVE-2022-2992 - CVE-2022-2185 - CVE-2022-2884 + - CVE-2023-22490 confluence: - CVE-2019-3394 - CVE-2019-3396