{"vulnerability": "CVE-2022-0739", "sightings": [{"uuid": "bb1af735-b33e-4fd9-b7a0-83dc4a9f4a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "7c107e07-b0c1-49e5-a3b4-6a0a8a17ed26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:42.000000Z"}, {"uuid": "debe475c-cd26-44d5-a783-426f27b3e40b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3513", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPython Exploit for CVE-2022-0739\nURL\uff1ahttps://github.com/BKreisel/CVE-2022-0739\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-12-03T01:42:39.000000Z"}, {"uuid": "4c8f4372-2fef-4ed1-a514-c19014e99a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/wp_bookingpress_category_services_sqli.rb", "content": "", "creation_timestamp": "2022-12-05T21:30:44.000000Z"}, {"uuid": "605d15e3-ab3f-44e2-b180-b45d70a486ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/user_it_channel/123", "content": "\u0421\u043f\u0438\u0441\u043e\u043a \u0441\u0442\u0430\u0442\u0435\u0439, \u0433\u0434\u0435 \u043f\u0440\u043e\u0441\u0442\u044b\u043c \u044f\u0437\u044b\u043a\u043e\u043c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0440\u0430\u0437\u044a\u044f\u0441\u043d\u044f\u044e\u0442\u0441\u044f \u0440\u0430\u0437\u043d\u044b\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u0435\u043c\u044b \u043e\u0442 \u043a\u0430\u043d\u0430\u043b\u0430 @netrunnerz. \n\n\n\nModel OSI (\u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e) https://szybnev.medium.com/osi-network-model-in-simple-terms-ed91858a8991\n\n\u041f\u0440\u043e\u0442\u043e\u043a\u043e\u043b HTTP https://telegra.ph/HTTP-PROTOCOL-09-22\n\nHTTPS SSL \u0441\u0435\u0440\u0442\u0438\u043a\u0430\u0442 https://telegra.ph/HTTPS-SSL-Certificate-09-22\n\n\u041e\u0441\u043d\u043e\u0432\u044b Linux 1 (\u0441\u0430\u043c\u044b\u0435 \u0433\u043b\u0430\u0432\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b) https://telegra.ph/Osnovy-Linux-CHto-takoe-terminal-Osnovnye-komandy-09-25\n\n\u041e\u0441\u043d\u043e\u0432\u044b Linux 2 (\u043f\u0440\u043e\u0434\u0432\u0438\u043d\u0443\u0442\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b) https://telegra.ph/Osnovy-Linux-part-2-10-02\n\n\u041e\u0441\u043d\u043e\u0432\u044b Linux 3 (\u043f\u0440\u043e\u0434\u0432\u0438\u043d\u0443\u0442\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b) https://telegra.ph/Populyarnye-komandy-chast-3-10-09\n\n\u041f\u0440\u043e\u0442\u043e\u043a\u043e\u043b TLS  https://telegra.ph/CHto-takoe-TLS-protokol-prostymi-slovami-09-26\n\nDNS-\u0441\u0435\u0440\u0432\u0435\u0440 (simple explanation) https://telegra.ph/CHto-takoe-DNS-server-prostymi-slovami-09-28\n\n\u0420\u0435\u0441\u0443\u0440\u0441\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 DNS https://telegra.ph/CHto-takoe-resursnye-zapisi-DNS-prostymi-slovami-09-29-2\n\n\u0421\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0435 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u044b https://telegra.ph/Standartnye-porty-protokoly-09-29\n\nUPD \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b (simple explanation) https://telegra.ph/UDP-protokol-prostymi-slovami-10-01\n\n\u041f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u044b TCP/IP https://telegra.ph/Protokol-TCPIP-prostymi-slovami-10-03-2\n\n\u0420\u0430\u0437\u0431\u043e\u0440 Writeup HackTheBox OpenSource[EASY] https://szybnev.medium.com/writeup-hackthebox-opensource-easy-df9c16d9e31a\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c LFI - Local File Inclusion 1  https://telegra.ph/Web-security-flaw--LFI-10-10\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c LFI - Local File Inclusion  2 https://telegra.ph/Web-security-flaws--LFI-10-10\n\nSpawning a TTY Shell https://telegra.ph/Spawn-tty-shell-10-26\n\n\u041f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0447\u0435\u0440\u0435\u0437 LD_PRELOAD https://telegra.ph/Povyshenie-privilegij-cherez-LD-PRELOAD--HTB-Easy--Photobomb-10-30\n\n\nMetaTwo | CVE-2022-0739 + CVE-2021-29447  https://telegra.ph/MetaTwo--CVE-2022-0739--CVE-2021-29447--HTB-Easy-12-07\n\n\u041d\u0435 \u0437\u0430\u0431\u0443\u0434\u044c\u0442\u0435 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u0442\u044c\u0441\u044f \u043d\u0430 @netrunnerz.", "creation_timestamp": "2022-12-16T20:30:40.000000Z"}, {"uuid": "d3491129-5a58-4657-ba51-41342c21f25f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/netrunnerz/363", "content": "#\u0426\u0438\u043a\u043b\u0421\u0442\u0430\u0442\u0435\u0439_HTB\n\n[ MetaTwo | CVE-2022-0739 + CVE-2021-29447 | HTB Easy]\n\n\u0414\u043e\u0431\u0440\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0441\u0443\u0442\u043e\u043a, \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u043c\u044b \u0440\u0430\u0437\u0431\u0435\u0440\u0435\u043c \u043c\u0430\u0448\u0438\u043d\u0443 MetaTwo \u043d\u0430 Hack The Box \u0441\u043e \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e Easy. \u041f\u043e \u0445\u043e\u0434\u0443 \u0441\u0442\u0430\u0442\u044c\u0438 \u0432\u044b \u0438\u0437\u0443\u0447\u0438\u0442\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 CVE-2022-0739 (POC) + CVE-2021-29447 (POC)", "creation_timestamp": "2022-12-09T13:59:41.000000Z"}, {"uuid": "9e800327-2c07-4de9-b664-72b62b5c4bbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/574", "content": "\u200b\u200bCVE-2022-0739\n\nProof-of-Concept exploit (SQLI BookingPress before 1.0.11)\n\nhttps://github.com/Chris01s/CVE-2022-0739\n\n#cve #exploit", "creation_timestamp": "2022-11-28T19:10:42.000000Z"}, {"uuid": "ed90a829-0934-4d8c-87b4-f1849baba3ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7094", "content": "#exploit\n1. CVE-2022-38398, CVE-2022-40146:\nVulnerabilities in Apache Batik Default Security Controls - SSRF/RCE Through Remote Class Loading\nhttps://www.zerodayinitiative.com/blog/2022/10/28/vulnerabilities-in-apache-batik-default-security-controls-ssrf-and-rce-through-remote-class-loading\n\n2. CVE-2022-0739:\nSQLI BookingPress &lt;1.0.11 - Unauth SQL Injection\nhttps://github.com/Chris01s/CVE-2022-0739", "creation_timestamp": "2022-11-03T11:05:13.000000Z"}, {"uuid": "0c026b1d-67f4-4235-af50-1d0c55e57050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/intelexch/30253", "content": "https://github.com/destr4ct/CVE-2022-0739", "creation_timestamp": "2022-10-31T19:49:38.000000Z"}, {"uuid": "3e2c7821-a2ff-4291-8bdf-bd775754bb3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2523", "content": "#CVE-2022\nA Zeek CVE-2022-24491 detector.\n\nhttps://github.com/corelight/CVE-2022-24491\n\n\nwriteup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell\nhttps://github.com/Adynervi/CVE-2022-41082-RCE-PoC\n\nPython Exploit for CVE-2022-0739\n\nhttps://github.com/BKreisel/CVE-2022-0739\n\n@BlueRedTeam", "creation_timestamp": "2022-12-14T08:46:29.000000Z"}, {"uuid": "625fbf04-0ca8-4136-93dd-cc61d3c7ff68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2528", "content": "#CVE-2022\nwriteup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell\nhttps://github.com/Adynervi/CVE-2022-41082-RCE-PoC\n\n\nPython Exploit for CVE-2022-0739\nhttps://github.com/BKreisel/CVE-2022-0739\n\n\nAll details about CVE-2022-43097\n\nhttps://github.com/nibin-m/CVE-2022-43097\n\nCVE-2022-24112_POC\nhttps://github.com/Acczdy/CVE-2022-24112_POC\n\n@BlueRedTeam", "creation_timestamp": "2022-12-18T11:13:39.000000Z"}, {"uuid": "bd900a9e-6f64-4808-ade4-a073933b02d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0739", "type": "published-proof-of-concept", "source": "https://t.me/cybdetective/1496", "content": "List of articles that explain in simple terms the basics of information security from the @netrunnerz channel. \n\n\n\nModel OSI (simple guide) https://szybnev.medium.com/osi-network-model-in-simple-terms-ed91858a8991\n\nHTTP PROTOCOL (basic) https://telegra.ph/HTTP-PROTOCOL-09-22\n\nHTTPS SSL Sertificate (basic) https://telegra.ph/HTTPS-SSL-Certificate-09-22\n\nLinux basic 1 (most important terminal commands) https://telegra.ph/Osnovy-Linux-CHto-takoe-terminal-Osnovnye-komandy-09-25\n\nLinux basic 2 (advanced terminal commands) https://telegra.ph/Osnovy-Linux-part-2-10-02\n\nLinux basic 3 (advanced terminal commands)https://telegra.ph/Populyarnye-komandy-chast-3-10-09\n\nTLS Protocol (simple explanation) https://telegra.ph/CHto-takoe-TLS-protokol-prostymi-slovami-09-26\n\nDNS server (simple explanation) https://telegra.ph/CHto-takoe-DNS-server-prostymi-slovami-09-28\n\nDNS resource records (simple explanation) https://telegra.ph/CHto-takoe-resursnye-zapisi-DNS-prostymi-slovami-09-29-2\n\nStandard network protocols (quick guide) https://telegra.ph/Standartnye-porty-protokoly-09-29\n\nUPD Protocol (simple explanation) https://telegra.ph/UDP-protokol-prostymi-slovami-10-01\n\nTCP/IP Protocol https://telegra.ph/Protokol-TCPIP-prostymi-slovami-10-03-2\n\nWriteup HackTheBox OpenSource[EASY] https://szybnev.medium.com/writeup-hackthebox-opensource-easy-df9c16d9e31a\n\nLFI - Local File Inclusion vulnerability 1  https://telegra.ph/Web-security-flaw--LFI-10-10\n\nLFI - Local File Inclusion vulnerability 2 https://telegra.ph/Web-security-flaws--LFI-10-10\n\nSpawning a TTY Shell https://telegra.ph/Spawn-tty-shell-10-26\n\nPrivilege escalation with LD_PRELOAD https://telegra.ph/Povyshenie-privilegij-cherez-LD-PRELOAD--HTB-Easy--Photobomb-10-30\n\nNew:\n\nMetaTwo | CVE-2022-0739 + CVE-2021-29447  https://telegra.ph/MetaTwo--CVE-2022-0739--CVE-2021-29447--HTB-Easy-12-07\n\n\nDon't forget to follow @netrunnerz.", "creation_timestamp": "2022-12-16T21:16:25.000000Z"}]}