{"vulnerability": "CVE-2021-38295", "sightings": [{"uuid": "50f3be04-96aa-4472-949c-c0aaad14f8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38295", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/276", "content": "ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server #poc exploit\nhttps://github.com/bhdresh/CVE-2021-33766\n\n#poc CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)\nhttps://github.com/ZeusBox/CVE-2021-37980\n\nMy take on CVE-2021-30858 #poc for ps4 8.xx It's just a POC\nhttps://github.com/PeterMxx/ps4_8.00_vuln_poc\n\nA simple Python proof of concept for CVE-2021-38295\nhttps://github.com/ProfessionallyEvil/CVE-2021-38295-PoC\n\napache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)\nhttps://github.com/theLSA/apache-httpd-path-traversal-checker", "creation_timestamp": "2021-10-15T12:57:52.000000Z"}, {"uuid": "fe3af56e-cca8-478d-be37-58917817269c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38295", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/694", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA simple Python proof of concept for CVE-2021-38295.\nURL\uff1ahttps://github.com/ProfessionallyEvil/CVE-2021-38295-PoC", "creation_timestamp": "2021-10-14T15:47:18.000000Z"}, {"uuid": "045f961f-c4a1-48ef-8c25-122609377d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38295", "type": "published-proof-of-concept", "source": "https://t.me/cKure/7612", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Untested | CVE-2021-38295 PoC: A simple Python proof of concept for CVE-2021-38295.\n\nhttps://github.com/ProfessionallyEvil/CVE-2021-38295-PoC", "creation_timestamp": "2021-10-14T18:57:00.000000Z"}, {"uuid": "dde252d0-d0e2-4c4a-82fc-81cab4926b41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38295", "type": "seen", "source": "https://t.me/cibsecurity/30603", "content": "\u203c CVE-2021-38295 \u203c\n\nIn Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T00:27:54.000000Z"}, {"uuid": "c7f0ba55-890a-47f9-9562-c839c8203bac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38295", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4521", "content": "#exploit\n1. CVE-2021-33766:\nProxyToken - An Authentication Bypass in Microsoft Exchange Server PoC exploit\nhttps://github.com/bhdresh/CVE-2021-33766\n\n2. CVE-2021-38295:\nA simple Python PoC\nhttps://github.com/ProfessionallyEvil/CVE-2021-38295-PoC/commits/main", "creation_timestamp": "2021-10-15T11:07:01.000000Z"}]}