PoC Week 2024-07-22

Posted on Jul 22, 2024

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. This week, I moved the post release day from Sunday to Monday.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-4879

  • Severity: Awaiting analysis
  • Impacted Products: ServiceNow, self hosted - SN-hosted platforms have been patched.
  • Description: ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-4879
  • PoC: https://github.com/Mr-r00t11/CVE-2024-4879/

CVE-2024-38094, CVE-2024-38024, CVE-2024-38023

CVE-2024-37770

  • Severity: 9.1: CRITICAL
  • Impacted Products: 14Finger v1.1.
  • Description: Remote command execution (RCE) vulnerability in the fingerprint function. This vulnerability allows attackers to execute arbitrary commands via a crafted payload.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-37770
  • PoC: https://github.com/k3ppf0r/CVE-2024-37770/

CVE-2024-39914

CVE-2024-39171

  • Severity: 9.8: CRITICAL
  • Impacted Products: PHPVibe v11.0.46
  • Description: Directory Travel in PHPVibe v11.0.46 due to incomplete blacklist checksums and directory checks, which can lead to code execution via writing specific statements to .htaccess and code to a file with a .png suffix.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-39171
  • PoC: https://github.com/751897386/PHPVibe_vulnerability_Directory-Traversal

CVE-2024-27292

  • Severity: 7.5: HIGH
  • Impacted Products: Docassemble versions 1.4.53 to 1.4.96
  • Description: Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. The vulnerability has been patched in version 1.4.97 of the master branch.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-27292
  • PoC: https://github.com/th3gokul/CVE-2024-27292

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.