PoC Week 2025-01-27

Posted on Jan 27, 2025

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2025-21298

CVE-2024-50603

  • Severity: 8.2 HIGH
  • Impacted Products: Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996.
  • Description: Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-50603
  • PoC: https://github.com/th3gokul/CVE-2024-50603

CVE-2024-55591

  • Severity: 9.8 CRITICAL
  • Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
  • Description: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-55591
  • PoC: https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591/ (Not a PoC, just a script to check if your instance is vulnerable, but I think it’s valuable and useful as the vuln is critical)

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.