The GitLab GraphQL API information leak allows a remote, unauthenticated attacker to recover usernames, names, and sometimes email addresses. On the face of it, that sounds very low-stakes. However,account discovery is a MITRE ATT&CK techniquefor a reason. Collecting a list of valid user ...
Gitlab: CVE-2021-4191: Unauthenticated user enumeration on GraphQL API Severity 5 CVSS (AV:N/AC:L/Au:N/C:P/I:N/A:N) Published 02/26/2022 Created 03/02/2022 Added 03/01/2022 Modified 04/06/2022 Description An issue has been discovered in GitLab CE/EE affecting versions 13.0 to ...
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.0 and all versions starting from 14.4 before 14.8. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration by unauthenticated users through the GraphQL API. This is a medium sever...
@ruby actually had the idea to try what I'm doing via the GraphQL APIs instead, and after sending me over an example query it does exactly what I need with CI token auth! query($fullPath:ID!, $after:String) { group(fullPath: $fullPath) { packages(first: 100, after: $after, ...