PoC Week 2024-05-19

Posted on May 19, 2024

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-32002

  • Severity: 9 CRITICAL
  • Impacted Products: Git prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4
  • Description: Repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule’s worktree but into a .git/ directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed.
  • Remediation: Upgrade git. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
  • More Info: CVE-2024-32002
  • PoC: https://github.com/M507/CVE-2024-32002/

CVE-2024-3806

  • Severity: 9.8 CRITICAL
  • Impacted Products: Porto WP Theme up to and including 7.1.0
  • Description: The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the ‘porto_ajax_posts’ function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
  • Remediation: Check developer advice.
  • More Info: CVE-2024-3806
  • PoC: https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc

CVE-2024-32735

CVE-2024-29895

  • Severity: Awaiting Analysis
  • Impacted Products: Cacti 1.3.x DEV branch
  • Description: Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when register_argc_argv option of PHP is On.
  • Remediation: Check developer advice.
  • More Info: CVE-2024-29895
  • PoC: https://github.com/Stuub/CVE-2024-29895-CactiRCE-PoC/

CVE-2023-45866

  • Severity: 6.5 MEDIUM
  • Impacted Products: Various BlueZ packages, e.g. bluez 5.64-0ubuntu1. Can lead to keystroke injection on Linux, MacOS or Android.
  • Description: Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access.
  • Remediation: Check developer advice.
  • More Info: CVE-2023-45866
  • PoC: https://github.com/marcnewlin/hi_my_name_is_keyboard

And a bonus PoC that I spotted this week but wasn’t in the newsletters yet as of this morning:

CVE-2024-27130

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.