PoC Week 2024-12-09

Posted on Dec 9, 2024

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-42327

  • Severity: 9.9 CRITICAL
  • Impacted Products: FreeBSD 13.3, 14.1, 14.0
  • Description: A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-42327
  • PoC: https://github.com/aramosf/cve-2024-42327/

CVE-2024-50672

  • Severity: Awaiting analysis
  • Impacted Products: Adapt Learning Adapt Authoring Tool <= 0.11.3
  • Description: A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the “Reset password” feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose’s find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application.
  • Remediation: Follow developer guidance.
  • More Info: NVD - CVE-2024-50672
  • PoC: https://pages.dos-m0nk3y.com/blog/Adapt%20Authoring%20Tool%200.11.3%20-%20Authenticated%20Remote%20Code%20Execution/

CVE-2024-49039

CVE-2024-11680

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.