Skip to content

Latest commit

 

History

History
21 lines (17 loc) · 1.28 KB

Sugar, We're Goin Up.md

File metadata and controls

21 lines (17 loc) · 1.28 KB

MetaCTF 2021

Sugar, We're Goin Up (125pts)

Description:

In September 2021, GitLab upgraded the CVSSv3 score for a critical remote code execution vulnerability to 10.0, the highest possible score. Although a patch was released in April, numerous public-facing, unpatched GitLab instances remain vulnerable. What is the CVE number for this critical, actively exploited vulnerability? The flag format will be CVE-XXXX-XXXX.

Step 1 - Do Research:

By using Google we can search for a GitLab RCE vulnerability and check out anything recent. Sure enough, the first result talks about a patch released in April and an upgraded CVSSv3 score. Certainly, this is our intended CVE.

The only potentially confusing thing in this challenge is that the flag format is specified clearly as CVE-XXXX-XXXX and our format is CVE-XXXX-XXXXX, which causes some need for double-checking. We decided that this was a simple oversight and made the right call.

Flag Spoiler CVE-2021-22205

Learning Takeaways

We learned about a GitLab CVE with the highest possible CVSSv3 score that allows for unauthenticated RCE via DjVu file upload.