PoC Week 2024-10-21

Posted on Oct 21, 2024

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-9680

  • Severity: 9.8 CRITICAL
  • Impacted Products: Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0
  • Description: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-9680
  • PoC: https://github.com/tdonaworth/Firefox-CVE-2024-9680/

CVE-2024-9465

CVE-2024-28987

  • Severity: 9.1 CRITICAL
  • Impacted Products: SolarWinds Web Help Desk (WHD)
  • Description: A hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-28987
  • PoC: https://github.com/horizon3ai/CVE-2024-28987/

CVE-2024-21534

  • Severity: 9.8 CRITICAL
  • Impacted Products: jsonpath-plus before 10.0.7
  • Description: Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-21534
  • PoC: https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884

CVE-2024-20017

  • Severity: 9.8 CRITICAL
  • Impacted Products: Mediatek Mt7981, Mt6890, Mt7915, Mt7916, Mt7986
  • Description: In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-20017
  • PoC: https://github.com/mellow-hype/cve-2024-20017/

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.