CVE-2023-7028 Exploitation Tool
This Python script automates the exploitation of a hypothetical security vulnerability (CVE-2023-7028) on GitLab instances. It facilitates password reset attacks on specified target email addresses, demonstrating a potential security risk. The tool supports command-line options for GitLab URL, target email, and optional parameters, with enhancements for handling multiple URLs and emails from a file. Note: This script is intended for educational purposes only and should not be used for unauthorized or malicious activities.
- Automated CVE-2023-7028 exploitation on GitLab
- Password reset attack with CSRF token retrieval
python script.py -u <GitLab URL> -t <Target email> [-e <Evil email>] [-p <Password>]
Contributions are welcome! Please follow the guidelines outlined in the CONTRIBUTING.md file.