$33,510 Bounty: Exploiting GitLab’s Hidden Redis Injection
GitLab EE 15.3.1版本中存在一个严重漏洞:通过GitHub导入功能中的`default_branch`参数控制,利用Sawyer反序列化和Redis协议注入技术,导致远程代码执行,实现服务器完全控制。该漏洞被研究人员发现并获得$33,510赏金。 2025-6-19 06:22:39 Author: infosecwriteups.com(查看原文) 阅读量:15 收藏

Abusing Sawyer Deserialization and Redis Protocol Tricks to Achieve Remote Code Execution on GitLab Servers

Monika sharma

Introduction

When you think of importing a GitHub repository into GitLab, what’s the worst that could happen? For most, it’s a failed import or a few missing commits. But in one case, a critical Remote Command Execution (RCE) vulnerability hid behind GitLab’s GitHub import feature.

This write-up explores how a security researcher leveraged deserialization quirks, Redis protocol abuse, and overlooked method overrides to escalate a seemingly harmless feature into full server compromise earning a $33,510 bounty.

The Vulnerability at a Glance

  • Platform: GitLab EE 15.3.1
  • Vulnerability: Remote Code Execution via Redis command injection
  • Bounty: $33,510
  • Root Cause: Improper handling of attacker-controlled default_branch in GitHub import, allowing method override abuse in Sawyer::Resource
  • Impact: Complete server compromise from a simple API request

The Discovery

  1. The Context

文章来源: https://infosecwriteups.com/33-510-bounty-exploiting-gitlabs-hidden-redis-injection-c2639520331b?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh