PoC Week 2024-12-02

Posted on Dec 2, 2024

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-9474

  • Severity: 6.9 MEDIUM
  • Impacted Products: Palo Alto PAN-OS - various versions, see NIST link
  • Description: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-9474
  • PoC: https://github.com/Chocapikk/CVE-2024-9474

CVE-2024-0012

CVE-2024-49039

CVE-2024-47575

  • Severity: 9.8 CRITICAL
  • Impacted Products: FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7
  • Description: Vuln allows attacker to execute arbitrary code or commands via specially crafted requests.
  • More Info: NVD - CVE-2024-47575
  • PoC: https://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575/ and full blog post here.

CVE-2024-8068 & CVE-2024-8069

CVE-2024-9680

  • Severity: 9.8 CRITICAL
  • Impacted Products: Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0
  • Description: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-9680
  • PoC: https://github.com/tdonaworth/Firefox-CVE-2024-9680/

CVE-2024-47533

  • Severity: 9.8 CRITICAL
  • Impacted Products: Cobbler version 3.0.0 and prior to versions 3.2.3 and 3.3.7.
  • Description: Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability. utils.get_shared_secret() always returns -1, which allows anyone to connect to cobbler XML-RPC as user '' password -1 and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
  • More Info: NVD - CVE-2024-47533
  • PoC: https://github.com/cobbler/cobbler/security/advisories/GHSA-m26c-fcgh-cp6h

CVE-2024-1212

  • Severity: 9.8 CRITICAL
  • Impacted Products: Progress Loadmaster, various versions.
  • Description: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
  • More Info: NVD - CVE-2024-1212
  • PoC: https://github.com/Chocapikk/CVE-2024-1212/

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.