PoC Week 2024-06-23
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-4577
- Severity: Awaiting Reanalysis
- Impacted Products: PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages.
- Description: Windows may use “Best-Fit” behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-4577
- PoC: https://github.com/watchtowrlabs/CVE-2024-4577/
CVE-2024-4898
- Severity: Awaiting Analysis
- Impacted Products: The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress in all versions up to, and including, 0.1.0.38
- Description: Attackers can connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-4898
- PoC: https://github.com/truonghuuphuc/CVE-2024-4898-Poc/
CVE-2024-29855
- Severity: Awaiting Analysis
- Impacted Products: Veeam Recovery Orchestrator.
- Description: Hard-coded JWT secret allows authentication bypass.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-29855
- PoC: https://github.com/sinsinology/CVE-2024-29855/
CVE-2024-27173
- Severity: Awaiting Analysis
- Impacted Products: Toshiba e-Studio (? not v clear from current info)
- Description: Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-27173
- PoC: https://github.com/Ieakd/0day-POC-for-CVE-2024-27173/
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.