PoC Week 2024-12-09
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-42327
- Severity: 9.9 CRITICAL
- Impacted Products: FreeBSD 13.3, 14.1, 14.0
- Description: A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-42327
- PoC: https://github.com/aramosf/cve-2024-42327/
CVE-2024-50672
- Severity: Awaiting analysis
- Impacted Products: Adapt Learning Adapt Authoring Tool <= 0.11.3
- Description: A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the “Reset password” feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose’s find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application.
- Remediation: Follow developer guidance.
- More Info: NVD - CVE-2024-50672
- PoC: https://pages.dos-m0nk3y.com/blog/Adapt%20Authoring%20Tool%200.11.3%20-%20Authenticated%20Remote%20Code%20Execution/
CVE-2024-49039
- Severity: 8.8 HIGH
- Impacted Products: Windows - see the Microsoft Advisory
- Description: Windows Task Scheduler Elevation of Privilege Vulnerability.
- More Info: NVD - CVE-2024-49039
- PoC: https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039/
CVE-2024-11680
- Severity: 8.8 HIGH
- Impacted Products: ProjectSend versions prior to r1720
- Description: ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application’s configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
- More Info: NVD - CVE-2024-11680
- PoC: https://raw.githubusercontent.com/rapid7/metasploit-framework/refs/heads/master/modules/exploits/linux/http/projectsend_unauth_rce.rb
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.