{"vulnerability": "CVE-2022-30778", "sightings": [{"uuid": "b79276f3-5947-4925-9af7-cb4d53d75047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2265", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCase for CVE-2022-30778\nURL\uff1ahttps://github.com/kang8/CVE-2022-30778\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-23T07:09:27.000000Z"}, {"uuid": "3a251cbf-c6d2-45cd-b477-4964f9c27417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "Telegram/75xPQErj_o1BxNCA0_YwJS-cOOLVtcfr457jOo5lMd5EYw", "content": "", "creation_timestamp": "2022-05-23T14:07:05.000000Z"}, {"uuid": "d0296582-9881-4984-9209-05d7e3520e22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/168", "content": "CVE-2022-30778 : Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain  \n__destruct in Illuminate\\Broadcasting\\PendingBroadcast.php and dispatch($command) in Illuminate\\Bus\\QueueingDispatcher.php\n\nhttps://github.com/kang8/CVE-2022-30778", "creation_timestamp": "2022-05-23T18:44:38.000000Z"}, {"uuid": "cc1058c3-1dd0-4846-a5eb-a21141ba3219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30778", "type": "seen", "source": "https://t.me/cibsecurity/42712", "content": "\u203c CVE-2022-30778 \u203c\n\nLaravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in __destruct in Illuminate\\Broadcasting\\PendingBroadcast.php and dispatch($command) in Illuminate\\Bus\\QueueingDispatcher.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-16T07:25:57.000000Z"}, {"uuid": "1d1c83ae-f412-4f39-bc80-b0ce7817d857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2096", "content": "#CVE-2022\n\nCase for CVE-2022-30778\n\nhttps://github.com/kang8/CVE-2022-30778\n\n@BlueRedTeam", "creation_timestamp": "2022-05-23T18:58:29.000000Z"}, {"uuid": "94c0490e-2778-4dff-8294-5669d470e2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6069", "content": "#exploit\n1. CVE-2022-1292:\nOpenSSL - OS Command Injection\nhttps://github.com/li8u99/CVE-2022-1292\n\n2. CVE-2022-30778:\nLaravel 9.1.8 - RCE\nhttps://github.com/kang8/CVE-2022-30778", "creation_timestamp": "2022-05-25T11:03:01.000000Z"}]}