PoC Week 2024-11-18

Posted on Nov 21, 2024

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-51132

  • Severity: Awaiting analysis
  • Impacted Products: Red Hat Camel Spring Boot 4 and 3. JBoss Fuse 7. Fhir < 6.4.0, Red Hat Integration 1.
  • Description: An XML External Entity (XXE) vulnerability in HAPI FHIR before v6.4.0 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted request containing malicious XML entities.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-51132
  • PoC: https://github.com/JAckLosingHeart/CVE-2024-51132-POC

CVE-2024-49040

CVE-2024-8068

CVE-2024-5910

CVE-2024-50667

CVE-2024-48746

CVE-2024-47575

  • Severity: 9.8 CRITICAL
  • Impacted Products: FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7
  • Description: Vuln allows attacker to execute arbitrary code or commands via specially crafted requests.
  • More Info: NVD - CVE-2024-47575
  • PoC: https://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575/ and full blog post here.

CVE-2024-45409

  • Severity: 9.8 CRITICAL
  • Impacted Products: Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0
  • Description: The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
  • More Info: NVD - CVE-2024-45409
  • PoC: https://github.com/synacktiv/CVE-2024-45409

CVE-2024-10914

  • Severity: 9.2 CRITICAL
  • Impacted Products: D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028
  • Description: It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
  • More Info: NVD - CVE-2024-10914
  • PoC: https://github.com/imnotcha0s/CVE-2024-10914

CVE-2024-27195

  • Severity: Awaiting analysis
  • Impacted Products: Trimble TM4Web 22.2.0
  • Description: Trimble TM4Web 22.2.0 allows unauthenticated attackers to access /inc/tm_ajax.msw?func=UserfromUUID&uuid= to retrieve the last registration access code and use this access code to register a valid account. via a PUT /inc/tm_ajax.msw request. If the access code was used to create an Administrator account, attackers are also able to register new Administrator accounts with full privileges.
  • More Info: NVD - CVE-2024-27195
  • PoC: https://packetstormsecurity.com/files/178023/trimbletm4web2220-escalate.txt

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.