{"vulnerability": "CVE-2022-25262", "sightings": [{"uuid": "8799b687-20dd-4029-833f-a3047a450bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25262", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2094", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover\nURL\uff1ahttps://github.com/yuriisanin/CVE-2022-25262\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-03T21:52:16.000000Z"}, {"uuid": "9cd340a4-ef64-4cbf-9e7f-0c897be4486b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25262", "type": "published-proof-of-concept", "source": "https://t.me/ShlezySec_Channel/213", "content": "CVE-2022-25262:\n \u05d4\u05e9\u05ea\u05dc\u05d8\u05d5\u05ea \u05e2\u05dc \u05ea\u05d2\u05d5\u05d1\u05ea SAML \u05d1\u05dc\u05d7\u05d9\u05e6\u05d4 \u05d0\u05d7\u05ea \u05e9\u05dc JetBrains Hub (PoC + \u05e4\u05e8\u05d8\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea)\n https://github.com/yuriisanin/CVE-2022-25262", "creation_timestamp": "2022-05-05T04:57:56.000000Z"}, {"uuid": "ac11b503-5239-49ab-aa58-e6efe625c289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25262", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1496", "content": "CVE-2022-25262\nPoC + \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-25262 | JetBrains Hub single-click SAML response takeover\nhttps://github.com/yuriisanin/CVE-2022-25262\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-05-07T05:01:46.000000Z"}, {"uuid": "ff307b00-c0d2-4671-ad20-cc97a536d2ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25262", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/136", "content": "CVE-2022-25262 : JetBrains Hub single-click SAML response takeover \nhttps://github.com/yuriisanin/CVE-2022-25262", "creation_timestamp": "2022-05-05T18:36:39.000000Z"}, {"uuid": "64741bfa-921d-4171-bdce-616f6379d75e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25262", "type": "published-proof-of-concept", "source": "https://t.me/reconshell/1271", "content": "CVE-2022-25262 JetBrains SAML response takeover\n\n#CVE-2022-25262 #Vulnerability #JetBrains #CVE\n#Exploit #Hacking #Malware #Bugbounty #VAPT \n\nhttps://reconshell.com/cve-2022-25262-jetbrains-hub-saml-response-takeover/", "creation_timestamp": "2022-05-04T20:48:01.000000Z"}, {"uuid": "ca7b45ce-b687-492a-893e-f78a850eb7a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25262", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5944", "content": "#exploit\n1. CVE-2022-25262:\nJetBrains Hub single-click SAML response takeover (PoC + vulnerability details)\nhttps://github.com/yuriisanin/CVE-2022-25262\n\n2. CVE-2022-24707:\nSQL Injection Vulnerability on Puncher plugin\nhttps://github.com/Altelus1/CVE-2022-24707", "creation_timestamp": "2022-05-05T11:01:01.000000Z"}]}