PoC Week 2024-10-28
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-9264
- Severity: 9.9 CRITICAL
- Impacted Products: Grafana
- Description: The SQL Expressions experimental feature of Grafana allows for the evaluation of
duckdb
queries containing user input. These queries are insufficiently sanitized before being passed toduckdb
, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. Theduckdb
binary must be present in Grafana’s $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. - Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-9264
- PoC: https://github.com/z3k0sec/File-Read-CVE-2024-9264/
CVE-2024-28987
- Severity: Awaiting analysis.
- Impacted Products: SolarWinds Web Help Desk (WHD)
- Description: A hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-28987
- PoC: https://github.com/horizon3ai/CVE-2024-28987/
CVE-2024-5274
- Severity: 8.8 HIGH
- Impacted Products: Google Chrome prior to 125.0.6422.112
- Description: Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-5274
- PoC: https://github.com/mistymntncop/CVE-2024-5274/
CVE-2024-48914
- Severity: 8.8 HIGH
- Impacted Products: Vendure versions prior to 3.0.5 and 2.3.3
- Description: Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure’s asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing
/../
. - Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-48914
- PoC: https://github.com/EQSTLab/CVE-2024-48914/
CVE-2024-48153
- Severity: Awaiting analysis
- Impacted Products: DrayTek Vigor3900 1.5.1.3
- Description: DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_subconfig function.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-48153
- PoC: https://github.com/tw11ty/CVE/blob/main/DrayTek/Vigor3900/Vigor3900%20command%20execution%20vulnerability.md
CVE-2024-47945
- Severity: Awaiting analysis
- Impacted Products: Rittal iot interface firmware < 6.21.00.2
- Description: The devices are vulnerable to session hijacking due to insufficient entropy in its session ID generation algorithm. The session IDs are predictable, with only 32,768 possible values per user, which allows attackers to pre-generate valid session IDs, leading to unauthorized access to user sessions. This is not only due to the use of an (insecure) rand() function call but also because of missing initialization via srand(). As a result only the PIDs are effectively used as seed.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-47945
- PoC: https://sec-consult.com/fileadmin/user_upload/sec-consult/Dynamisch/Advisories/2024_10/sessionID_online_Brute_Forcer.py
CVE-2024-44000
- Severity: Awaiting analysis
- Impacted Products: LiteSpeed Cache: from n/a before 6.5.0.1.
- Description: Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-44000
- PoC: https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache/
CVE-2024-38094, CVE-2024-38024, CVE-2024-38023
- Severity: 7.2 HIGH
- Impacted Products: SharePoint.
- Description: An authenticated attacker with Site Owner permissions can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server.
- Remediation: Follow developer guidance here.
- More Info: CVE-2024-38094
- PoC: https://packetstormsecurity.com/files/179460/MS-SharePoint-July-Patch-RCE-PoC-main.zip
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.