{"vulnerability": "CVE-2022-3028", "sightings": [{"uuid": "4eeb0d16-8460-4dfc-967a-9519b0dc1b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30280", "type": "seen", "source": "https://t.me/kasraone_com/478", "content": "\ud83d\udd34 CVE \n\n\n\ud83d\udd34 CVE-2022-30280\n\n\n\u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u062d\u0645\u0644\u0627\u062a CSRF \u062f\u0631 \u0635\u0641\u062d\u0647 \n\n/SecurityManagement/html/createuser.jsf \u062f\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 Nokia NetAct 22 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f. \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0642\u0627\u062f\u0631 \u0627\u0633\u062a \u06a9\u0627\u0631\u0628\u0631\u0627\u0646\u06cc \u0628\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647\u060c \u062d\u062a\u06cc \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc\u060c \u0628\u0633\u0627\u0632\u062f. \u0627\u06cc\u0646 \u0628\u0631\u0646\u0627\u0645\u0647 (\u062d\u062a\u06cc \u0627\u06af\u0631 \u06cc\u06a9 \u062a\u0648\u06a9\u0646 CSRF \u0631\u0627 \u0628\u0631\u0627\u06cc \u062f\u0631\u062e\u0648\u0627\u0633\u062a GET \u062a\u0635\u0627\u062f\u0641\u06cc \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u06a9\u0646\u062f) \u0647\u0631\u06af\u0632 \u062a\u0648\u06a9\u0646 CSRF \u0631\u0627 \u062a\u0623\u06cc\u06cc\u062f \u0646\u0645\u06cc\u200c\u06a9\u0646\u062f. \u0628\u0627 \u06a9\u0645\u06a9 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc/\u0641\u0634\u06cc\u0646\u06af (\u0645\u0627\u0646\u0646\u062f \u0627\u0631\u0633\u0627\u0644 \u0644\u06cc\u0646\u06a9 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u06cc\u0645\u06cc\u0644 \u06cc\u0627 \u0686\u062a)\u060c \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u06cc\u06a9 \u0628\u0631\u0646\u0627\u0645\u0647 \u0648\u0628 \u0631\u0627 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u0639\u0645\u0644\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u062e\u0648\u062f \u062a\u0634\u0648\u06cc\u0642 \u06a9\u0646\u062f. \u062f\u0631 \u0635\u0648\u0631\u062a \u0622\u0633\u064a\u0628 \u067e\u0630\u064a\u0631\u064a \u064a\u0643 \u0643\u0627\u0631\u0628\u0631 \u0639\u0627\u062f\u064a\u060c \u064a\u0643 \u062d\u0645\u0644\u0647 CSRF \u0645\u0648\u0641\u0642 \u0645\u064a \u062a\u0648\u0627\u0646\u062f \u0643\u0627\u0631\u0628\u0631 \u0631\u0627 \u0645\u062c\u0628\u0648\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u062f\u0631\u062e\u0648\u0627\u0633\u062a\u200c\u0647\u0627\u06cc \u062a\u063a\u064a\u064a\u0631 \u0648\u0636\u0639\u064a\u062a \u0645\u0627\u0646\u0646\u062f \u0627\u0646\u062a\u0642\u0627\u0644 \u0648\u062c\u0648\u0647\u060c \u062a\u063a\u064a\u064a\u0631 \u0622\u062f\u0631\u0633 \u0627\u064a\u0645\u064a\u0644 \u0648 \u063a\u064a\u0631\u0647 \u0643\u0646\u062f. \u062f\u0631 \u0635\u0648\u0631\u062a\u06cc \u06a9\u0647 \u0642\u0631\u0628\u0627\u0646\u06cc \u06cc\u06a9 \u062d\u0633\u0627\u0628 \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc \u0628\u0627\u0634\u062f\u060c CSRF \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06a9\u0644 \u0628\u0631\u0646\u0627\u0645\u0647 \u0648\u0628 \u0622\u0633\u06cc\u0628 \u0628\u0631\u0633\u0627\u0646\u062f.", "creation_timestamp": "2023-08-24T20:02:30.000000Z"}, {"uuid": "59166003-abcb-4434-80a9-31c7a6f610f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30287", "type": "published-proof-of-concept", "source": "https://t.me/cKure/9634", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Zero-Day: A remote code execution vulnerability in the open-source Horde Webmail client can allow to take over servers by sending a specially crafted email.\nResearchers from SonarSource discovered a remote code execution vulnerability (CVE-2022-30287) in the open-source Horde Webmail client. Horde Webmail allows users to manage contacts, the flaw could be exploited by an authenticated user of a Horde instance to take over an email server by sending a specially crafted email to a victim.\n\n\u201cThe vulnerability can be exploited with a single GET request which can be triggered via Cross-Site-Request-Forgery.  For this, an attacker can craft a malicious email and include an external image that when rendered exploits the vulnerability without further interaction of a victim: the only requirement is to have a victim open the malicious email.\u201d reads the advisory published by SonarSource.\n\nhttps://blog.sonarsource.com/horde-webmail-rce-via-email/", "creation_timestamp": "2022-06-02T07:41:02.000000Z"}, {"uuid": "cf5ffdf0-07fd-4c30-ae42-d1106b185ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30289", "type": "seen", "source": "https://t.me/cibsecurity/45584", "content": "\u203c CVE-2022-30289 \u203c\n\nA stored Cross-site Scripting (XSS) vulnerability was identified in the Data Import functionality of OpenCTI through 5.2.4. An attacker can abuse the vulnerability to upload a malicious file that will then be executed by a victim when they open the file location.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-05T16:13:31.000000Z"}, {"uuid": "ef07a88a-b8b3-4f92-b33a-6d594fe9745e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30287", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/201", "content": "CVE-2022-30287 : Horde Webmail - RCE via Email\nhttps://blog.sonarsource.com/horde-webmail-rce-via-email", "creation_timestamp": "2022-06-04T12:12:07.000000Z"}, {"uuid": "13e7b918-558b-4904-bb85-465baf3c6314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30287", "type": "seen", "source": "https://t.me/true_secator/3010", "content": "SonarSource \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043d\u043e\u0432\u0443\u044e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE (CVE-2022-30287) \u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u0435 Horde Webmail \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0435 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e \u0436\u0435\u0440\u0442\u0432\u0435 \u0431\u0435\u0437 \u043a\u0430\u043a\u043e\u0433\u043e-\u043b\u0438\u0431\u043e \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041f\u043e \u0441\u0443\u0442\u0438, \u043e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e Horde \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0431\u0430\u0437\u043e\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043a\u043b\u0438\u0435\u043d\u0442 \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0441\u043f\u0438\u0441\u043a\u0438 \u043a\u043e\u043d\u0442\u0430\u043a\u0442\u043e\u0432.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043e\u0434\u043d\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 GET, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0437\u0430\u043f\u0443\u0449\u0435\u043d \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (CSRF).\u00a0\u0414\u043b\u044f \u044d\u0442\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0434\u043e\u043b\u0436\u0435\u043d \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e \u0438 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u043d\u0435\u0448\u043d\u0435\u0435 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043f\u0440\u0438 \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0435\u0437 \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0436\u0435\u0440\u0442\u0432\u043e\u0439: \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 - \u0447\u0442\u043e\u0431\u044b \u0436\u0435\u0440\u0442\u0432\u0430 \u043e\u0442\u043a\u0440\u044b\u043b\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0435 \u043f\u0438\u0441\u044c\u043c\u043e.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u044a\u044f\u0441\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0436\u0435\u0440\u0442\u0432\u044b, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0435\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442, \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435 \u043f\u0435\u0440\u0435\u0434\u0430\u044e\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0448\u0438\u0431\u043a\u0438. \n\n\u0412 \u0438\u0442\u043e\u0433\u0435, \u0435\u0441\u043b\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441\u043c\u043e\u0436\u0435\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440 \u0432\u0435\u0431-\u043f\u043e\u0447\u0442\u044b, \u0442\u043e \u0441\u043c\u043e\u0436\u0435\u0442 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0432\u0441\u044e \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043a\u043e\u0440\u0440\u0435\u0441\u043f\u043e\u043d\u0434\u0435\u043d\u0446\u0438\u044e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0441\u044b\u043b\u043a\u0430\u043c \u0434\u043b\u044f \u0441\u0431\u0440\u043e\u0441\u0430 \u043f\u0430\u0440\u043e\u043b\u044f \u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u043c, \u0432\u044b\u0434\u0430\u0442\u044c \u0441\u0435\u0431\u044f \u0437\u0430 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432 \u0438 \u0443\u043a\u0440\u0430\u0441\u0442\u044c \u0432\u0441\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Horde Webmail. \u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u0430\u0442\u0430\u043a\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u043d\u0430 \u0432\u0438\u0434\u0435\u043e.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0438 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0435\u0449\u0435 2 \u0444\u0435\u0432\u0440\u0430\u043b\u044f 2022 \u0433\u043e\u0434\u0430. \u0421\u043f\u0443\u0441\u0442\u044f \u043c\u0435\u0441\u044f\u0446 2 \u043c\u0430\u0440\u0442\u0430 Horde \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0434\u0440\u0443\u0433\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u0435\u0432\u044f\u0442\u0438\u043b\u0435\u0442\u043d\u0435\u0439 \u0434\u0430\u0432\u043d\u043e\u0441\u0442\u0438, \u0438 \u043f\u0440\u0438\u0441\u0442\u0443\u043f\u0430\u0435\u0442 \u043a \u0437\u0430\u043a\u0440\u044b\u0442\u0438\u044e \u043d\u043e\u0432\u043e\u0439 RCE. \u041e\u0434\u043d\u0430\u043a\u043e 3 \u043c\u0430\u044f 90-\u0434\u043d\u0435\u0432\u043d\u044b\u0439 \u0441\u0440\u043e\u043a \u0434\u043b\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u0439 \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u0438\u0441\u0442\u0435\u043a, \u0430 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0442\u0430\u043a \u0438 \u043d\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b \u0431\u043e\u0433\u0443.\n\n\u0412 \u0441\u0432\u0435\u0442\u0435 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0441 2017 \u0433\u043e\u0434\u0430 Horde Webmail \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0438 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0434\u044b\u0441\u043a\u0430\u0442\u044c \u0441\u0435\u0431\u0435 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0438\u0441.", "creation_timestamp": "2022-06-02T13:35:05.000000Z"}, {"uuid": "0a528a90-f0ba-443c-bcbb-335d35637106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30280", "type": "seen", "source": "https://t.me/cibsecurity/67152", "content": "\u203c CVE-2022-30280 \u203c\n\n/SecurityManagement/html/createuser.jsf in Nokia NetAct 22 allows CSRF. A remote attacker is able to create users with arbitrary privileges, even administrative privileges. The application (even if it implements a CSRF token for the random GET request) does not ever verify a CSRF token. With a little help of social engineering/phishing (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-24T18:26:10.000000Z"}, {"uuid": "e2efe817-6538-47e0-a71f-4a5fdc75ce80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3028", "type": "seen", "source": "https://t.me/cibsecurity/49134", "content": "\u203c CVE-2022-3028 \u203c\n\nA race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T20:43:10.000000Z"}, {"uuid": "c2dd6dc1-ee92-4f2e-abf1-beea4bce1751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30285", "type": "seen", "source": "https://t.me/cibsecurity/47452", "content": "\u203c CVE-2022-30285 \u203c\n\nIn Quest KACE Systems Management Appliance (SMA) through 12.0, a hash collision is possible during authentication. This may allow authentication with invalid credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-03T02:18:10.000000Z"}, {"uuid": "e22a2ad0-ebfd-4703-aad2-c6fb2c5999ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30286", "type": "seen", "source": "https://t.me/cibsecurity/42172", "content": "\u203c CVE-2022-30286 \u203c\n\npyscriptjs (aka PyScript Demonstrator) in PyScript through 2022-05-04 allows a remote user to read Python source code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-09T17:00:50.000000Z"}, {"uuid": "b5a49e53-56c6-41b3-888a-eb9dfa554786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30288", "type": "seen", "source": "https://t.me/cibsecurity/41961", "content": "\u203c CVE-2022-30288 \u203c\n\nAgoo through 2.14.2 does not reject GraphQL fragment spreads that form cycles, leading to an application crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T02:35:26.000000Z"}, {"uuid": "3533b3e9-d1bd-491a-9ded-1e56146151b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30284", "type": "seen", "source": "https://t.me/cibsecurity/41960", "content": "\u203c CVE-2022-30284 \u203c\n\nIn the python-libnmap package through 0.7.2 for Python, remote command execution can occur (if used in a client application that does not validate arguments).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-10T20:14:24.000000Z"}, {"uuid": "a736f8a4-633b-40f1-a18b-c69b8a8ca2ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30287", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6129", "content": "#Threat_Research\n1. PANTSDOWN\nhttps://eclypsium.com/2022/05/26/quanta-servers-still-vulnerable-to-pantsdown\n2. Horde Webmail - RCE via Email (CVE-2022-30287)\nhttps://blog.sonarsource.com/horde-webmail-rce-via-email", "creation_timestamp": "2022-06-04T13:07:35.000000Z"}]}