Logo
Zed Underson
2 months ago
CVE-2023-4220

Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS
Zed Underson
2 months ago
CVE-2023-50564

None

Github link:
https://github.com/Tanveer...
Zed Underson
2 months ago
CVE-2022-0944

None

Github link:
https://github.com/Tanveer...
Zed Underson
2 months ago
CVE-2023-41425

Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.

Github link:
https://github.com/Tanveer...
Zed Underson
2 months ago
CVE-2024-23114

None

Github link:
https://github.com/zgimszh...
Zed Underson
2 months ago
CVE-2024-23111

None

Github link:
https://github.com/zgimszh...
Zed Underson
2 months ago
CVE-2024-48569

None

Github link:
https://github.com/MarioTe...
Zed Underson
2 months ago
CVE-2019-9053

An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.

Github link:
https://github.com/louisth...
Zed Underson
2 months ago
Exploring Security Vulnerabilities in HTB's Chemistry CTF
In this Capture the Flag (CTF) challenge from Hack The Box, we tackled the “Chemistry” box, where reconnaissance played a pivotal role. Here’s an overview of the methodology used to exploit the vulnerabilities.

Recon and Initial Findings
Using Nmap, we discovered open ports—22 (SSH) and 5000, a Python-based web server using Werkzeug. Port 5000 hosted a “Chemistry CIF Analyzer” web application, enabling CIF (Crystallographic Information File) uploads for structure analysis. CIF files store crystal structure data, and handling them securely is crucial.

Upload Testing and CIF Analysis
We tested the upload functionality by uploading a sample CIF file, which returned a 404 error but hinted at a server path /structure. This behavior suggested a possible CIF parsing vulnerability using the pymatgen library. Outdated versions of Werkzeug and Python increased the likelihood of security flaws.

Exploitation via Deserialization and CIF Structure
Using a deserialization exploit in pymatgen, we crafted a malicious CIF file, embedding a reverse shell payload. This approach leveraged the server’s vulnerable parsing mechanisms. By executing the payload, we gained access to a low-privilege shell.

Hash Cracking and Privilege Escalation
Further exploration revealed an MD5-hashed database containing user credentials. Using hash-cracking tools, we obtained plaintext passwords, granting SSH access to the “rosa” user. From there, tunneling enabled us to exploit another service running on port 8080, where aiohttp, an outdated Python asynchronous server framework, revealed a directory traversal vulnerability (CVE-2024-23334). This allowed us to escalate privileges and access sensitive files.

Conclusion
This CTF highlighted critical security aspects: outdated dependencies, deserialization flaws, and improper file handling can expose applications to severe vulnerabilities. Continuous updates, secure file parsing practices, and dependency management are essential in safeguarding applications from these threats.

#hackthebox
Zed Underson
2 months ago
CVE-2024-46538

None

Github link:
https://github.com/EQSTLab...
Zed Underson
2 months ago
CVE-2023-42326

None

Github link:
https://github.com/bl4ckar...
Zed Underson
2 months ago
CVE-2024-4947

None

Github link:
https://github.com/uixss/P...
Zed Underson
2 months ago
CVE-2021-31755

None

Github link:
https://github.com/r3s3tt/...
Zed Underson
2 months ago
CVE-2022-41082

Microsoft Exchange Server Remote Code Execution Vulnerability.

Github link:
https://github.com/soltana...
Zed Underson
2 months ago
#CVE -2024-38812

None

Github link:
https://github.com/groshi/...
Zed Underson
2 months ago
#CVE -2023-46747

Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Github link:
https://github.com/AMELYA1...
Zed Underson
2 months ago
#CVE -2024-23113

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

Github link:
https://github.com/groshi/...
Zed Underson
2 months ago
#CVE -2022-20223

None

Github link:
https://github.com/xbee9/c...
Zed Underson
2 months ago
CVE-2023-46747

Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Github link:
https://github.com/MacTavi...
Zed Underson
2 months ago
CVE-2022-23131

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

Github link:
https://github.com/davidzz...
Zed Underson
2 months ago
CVE-2022-0944

None

Github link:
https://github.com/LipeOzy...
Zed Underson
2 months ago
CVE-2024-39205

None

Github link:
https://github.com/Marven1...

Nothing found!

Sorry, but we could not find anything in our database for your search query {{search_query}}. Please try again by typing other keywords.