{"vulnerability": "CVE-2021-44659", "sightings": [{"uuid": "2165c40a-b7f9-412e-8e14-0bbd9f756c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44659", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5038", "content": "#exploit\n1. CVE-2021-44659:\nAdding a new pipeline in GoCD server 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a SSRF\nhttps://github.com/Mesh3l911/CVE-2021-44659\n\n2. A buffer overflow vulnerability in a babykernel.ko driver. The exploit is written in a way to bypass SMEP protection and the technique used is ret2usr\nhttps://github.com/0x3SC4L4T3/Babykernel-ctf-ret2usr", "creation_timestamp": "2021-12-23T11:12:01.000000Z"}, {"uuid": "852f6b0e-25ad-4443-967b-3e799f874c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44659", "type": "seen", "source": "https://t.me/cibsecurity/34508", "content": "\u203c CVE-2021-44659 \u203c\n\nAdding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-22T20:18:18.000000Z"}, {"uuid": "a1c2575e-f6af-4807-9d06-dac4684dfb6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44659", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1558", "content": "#exploit\n1. CVE-2021-44659:\nAdding a new pipeline in GoCD server 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a SSRF\nhttps://github.com/Mesh3l911/CVE-2021-44659\n\n2. A buffer overflow vulnerability in a babykernel.ko driver. The exploit is written in a way to bypass SMEP protection and the technique used is ret2usr\nhttps://github.com/0x3SC4L4T3/Babykernel-ctf-ret2usr\n\n@BlueRedTeam", "creation_timestamp": "2021-12-23T04:24:58.000000Z"}]}