{"vulnerability": "CVE-2020-1074", "sightings": [{"uuid": "4e65d7ba-2a37-40c9-972e-1ac527378bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10749", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/1806", "content": "CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements) \nhttps://github.com/knqyf263/CVE-2020-10749", "creation_timestamp": "2020-06-14T17:47:45.000000Z"}, {"uuid": "d0aa914c-7313-4748-9751-67ec66386b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10749", "type": "seen", "source": "https://t.me/k8security/88", "content": "\u0421\u043e\u0432\u0441\u0435\u043c \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043d\u0430 \u043a\u0430\u043d\u0430\u043b\u0435 CNCF \u0431\u044b\u043b \u0432\u0435\u0431\u0438\u043d\u0430\u0440 \u0441 \u0438\u043d\u0442\u0440\u0438\u0433\u0443\u044e\u0449\u0435\u043c \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \"Kubernetes Security Anatomy and the Recently Disclosed CVEs\". \u0420\u0435\u0447\u044c \u0442\u0430\u043c \u0438\u0434\u0435\u0442 \u043e \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u043d\u044b\u0445 \u043d\u0430\u043c\u0438 \u0440\u0430\u043d\u0435\u0435: CVE-2020-8555, CVE-2020-8557, CVE-2020-8558, CVE-2020-8559, CVE-2020-10749. \u0414\u043e\u043a\u043b\u0430\u0434\u0447\u0438\u043a \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u043f\u043e \u0432\u0435\u0440\u0441\u0438\u0438 Kubernetes, \u0430 \u0434\u0430\u043b\u0435\u0435 \u043f\u0435\u0440\u0435\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u0437 \u0438\u0445 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0441 \u0440\u0430\u0441\u0441\u044b\u043b\u043a\u0438 Kubernetes ... \u041f\u043b\u044e\u0441 \u043d\u0435\u043c\u043d\u043e\u0433\u043e \u0440\u0435\u043a\u043b\u0430\u043c\u044b \u0432 \u043a\u043e\u043d\u0446\u0435.", "creation_timestamp": "2020-07-22T07:09:48.000000Z"}, {"uuid": "f9c99abf-8128-49ec-847b-5cc7a5a4ecce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10740", "type": "seen", "source": "https://t.me/arpsyndicate/2630", "content": "#ExploitObserverAlert\n\nCVE-2020-10740\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2020-10740. A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.\n\nFIRST-EPSS: 0.003330000\nNVD-IS: 5.9\nNVD-ES: 1.6", "creation_timestamp": "2024-01-07T08:55:37.000000Z"}, {"uuid": "59bf3c25-5e58-466c-88ca-14fa6f2bdd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10749", "type": "published-proof-of-concept", "source": "https://t.me/k8security/73", "content": "\u0412 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435 \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f PoC \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f CVE-2020-10749 \u0434\u043b\u044f  \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f Kubernetes MitM \u0430\u0442\u0430\u043a\u0438 \u0447\u0435\u0440\u0435\u0437 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0443 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e ICMPv6 Router Advertisement (RA) \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f. \u041e \u0434\u0435\u0442\u0430\u043b\u044f\u0445 \u0434\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u044f \u043f\u0438\u0441\u0430\u043b \u0440\u0430\u043d\u0435\u0435.", "creation_timestamp": "2020-06-12T12:28:43.000000Z"}, {"uuid": "a522a5a5-753b-498f-b4bb-424f68a0a956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10740", "type": "seen", "source": "https://t.me/cibsecurity/13017", "content": "ATENTION\u203c New - CVE-2020-10740\n\nA vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-25T07:55:24.000000Z"}, {"uuid": "2ed6800d-5980-4e33-af9e-49ffdd0039b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10747", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1209", "content": "#Offensive_security\nAttacking FreeIPA\n(Open Source Identity Management System):\n1. Authentication\nhttps://posts.specterops.io/attacking-freeipa-part-i-authentication-77e73d837d6a\n2. Enumeration\nhttps://posts.specterops.io/attacking-freeipa-part-ii-enumeration-ad27224371e1\n3. Finding A Path\nhttps://posts.specterops.io/attacking-freeipa-part-iii-finding-a-path-677405b5b95e\n4. CVE-2020-10747\nhttps://posts.specterops.io/attacking-freeipa-part-iv-cve-2020-10747-7c373a1bf66b", "creation_timestamp": "2024-10-26T04:55:15.000000Z"}, {"uuid": "199f0b70-ed0e-4439-99a1-de46ab21b2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10748", "type": "seen", "source": "https://t.me/ctinow/161687", "content": "https://ift.tt/FPxqjaN\nCVE-2023-6134 | JBoss KeyCloak Incomplete Fix CVE-2020-10748 redirect_uri cross site scripting (RHSA-2023:7854)", "creation_timestamp": "2024-01-02T11:31:29.000000Z"}, {"uuid": "21a841e2-a79a-430a-bd2a-eb34f6f4e854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10745", "type": "seen", "source": "https://t.me/cibsecurity/13287", "content": "ATENTION\u203c New - CVE-2020-10745\n\nA flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-07T18:55:21.000000Z"}]}