githubEdit

GitLab

GitLab security testing - enumeration, common vulnerabilities, and exploitation techniques.

Default Credentials

Username: root
Password: 5iveL!fe

Username: admin  
Password: 5iveL!fe

# Note: GitLab 14.0+ forces password change on first login

Enumeration

Public Information

# Check for public projects (even on private instances)
https://gitlab.target.com/explore
https://gitlab.target.com/explore/projects
https://gitlab.target.com/explore/groups
https://gitlab.target.com/explore/snippets

# Search for sensitive content
# Use searchbar for: password, secret, key, token, api_key, credentials

# API endpoints (may leak version info)
https://gitlab.target.com/api/v4/version
https://gitlab.target.com/api/v4/projects
https://gitlab.target.com/api/v4/users

User Enumeration

Version Detection

Common Vulnerabilities

CVE-2021-22205 (RCE via Image Upload) - Critical

CVE-2021-22214 (SSRF)

CVE-2023-2825 (Path Traversal)

CVE-2023-7028 (Account Takeover)

CI/CD Pipeline Exploitation

Secrets in CI Variables

Token Abuse

Runner Exploitation

GraphQL API Testing

Post-Exploitation

Tools

Last updated

Was this helpful?