{"vulnerability": "CVE-2022-3368", "sightings": [{"uuid": "54afc4ad-0af4-465d-b644-a2d40672ef14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33684", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14565", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-33684\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET request that is sent to the ClientCredentialFlow 'issuer url'. The intercepted credentials can be used to acquire authentication data from the OAuth2.0 server to then authenticate with an Apache Pulsar cluster. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. The Apache Pulsar Python Client wraps the C++ client, so it is also vulnerable in the same way. This issue affects Apache Pulsar C++ Client and Python Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and earlier. Any users running affected versions of the C++ Client or the Python Client should rotate vulnerable OAuth2.0 credentials, including client_id and client_secret. 2.7 C++ and Python Client users should upgrade to 2.7.5 and rotate vulnerable OAuth2.0 credentials. 2.8 C++ and Python Client users should upgrade to 2.8.4 and rotate vulnerable OAuth2.0 credentials. 2.9 C++ and Python Client users should upgrade to 2.9.3 and rotate vulnerable OAuth2.0 credentials. 2.10 C++ and Python Client users should upgrade to 2.10.2 and rotate vulnerable OAuth2.0 credentials. 3.0 C++ users are unaffected and 3.0 Python Client users will be unaffected when it is released. Any users running the C++ and Python Client for 2.6 or less should upgrade to one of the above patched versions.\n\ud83d\udccf Published: 2022-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T18:58:10.037Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/ky1ssskvkj00y36k7nys9b5gm5jjrzwv\n2. https://huntr.dev/bounties/df89b724-3201-47aa-b8cd-282e112a566f", "creation_timestamp": "2025-05-02T19:16:11.000000Z"}, {"uuid": "91385499-c696-4d75-bfcc-5d2e26c2722e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3368", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/366", "content": "CVE-2022-3368\nA hole in the arbitrary movement of files in the update component of the Avira Security software.\nIn general LPE and systm32\n\nhttps://github.com/Wh04m1001/CVE-2022-3368", "creation_timestamp": "2022-10-25T19:51:25.000000Z"}, {"uuid": "1a37cc28-1942-4db7-b56c-29f4e99281e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3368", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15882", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3368\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556.\n\ud83d\udccf Published: 2022-10-17T20:52:01.381Z\n\ud83d\udccf Modified: 2025-05-10T02:51:08.765Z\n\ud83d\udd17 References:\n1. https://support.norton.com/sp/static/external/tools/security-advisories.html", "creation_timestamp": "2025-05-10T03:26:15.000000Z"}, {"uuid": "2f42ed8f-b078-4e61-a46b-efd95ca1c320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3368", "type": "published-proof-of-concept", "source": "Telegram/Aip2cD1wV9jEhObTresP8hJEB71hNXiIX3hVSyyuJVppo6I", "content": "", "creation_timestamp": "2022-10-25T13:16:05.000000Z"}, {"uuid": "5328fd5a-f77a-47d2-9e65-ae38ae3bccbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3368", "type": "seen", "source": "https://t.me/proxy_bar/1078", "content": "CVE-2022-3368\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u043c \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Avira Security.\n\u0412 \u043e\u0431\u0449\u0435\u043c LPE \u0438 systm32\ndownload\n\n#lpe #avira #windows", "creation_timestamp": "2022-10-18T12:33:54.000000Z"}, {"uuid": "2a7f2916-9350-4e57-9763-541be7d768ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33684", "type": "seen", "source": "https://t.me/cibsecurity/52559", "content": "\u203c CVE-2022-33684 \u203c\n\nThe Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET request that is sent to the ClientCredentialFlow 'issuer url'. The intercepted credentials can be used to acquire authentication data from the OAuth2.0 server to then authenticate with an Apache Pulsar cluster. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. The Apache Pulsar Python Client wraps the C++ client, so it is also vulnerable in the same way. This issue affects Apache Pulsar C++ Client and Python Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and earlier. Any users running affected versions of the C++ Client or the Python Client should rotate vulnerable OAuth2.0 credentials, including client_id and client_secret. 2.7 C++ and Python Client users should upgrade to 2.7.5 and rotate vulnerable OAuth2.0 credentials. 2.8 C++ and Python Client users should upgrade to 2.8.4 and rotate vulnerable OAuth2.0 credentials. 2.9 C++ and Python Client users should upgrade to 2.9.3 and rotate vulnerable OAuth2.0 credentials. 2.10 C++ and Python Client users should upgrade to 2.10.2 and rotate vulnerable OAuth2.0 credentials. 3.0 C++ users are unaffected and 3.0 Python Client users will be unaffected when it is released. Any users running the C++ and Python Client for 2.6 or less should upgrade to one of the above patched versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-04T15:28:02.000000Z"}, {"uuid": "b757775d-886b-426b-9c27-59d9a9c5ae7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33685", "type": "seen", "source": "https://t.me/cibsecurity/46061", "content": "\u203c CVE-2022-33685 \u203c\n\nUnprotected dynamic receiver in Wearable Manager Service prior to SMR Jul-2022 Release 1 allows attacker to launch arbitray activity and access senstive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:39:30.000000Z"}, {"uuid": "3f3369c5-56f5-46d1-8d23-96be788a7c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3368", "type": "seen", "source": "https://t.me/cibsecurity/51633", "content": "\u203c CVE-2022-3368 \u203c\n\nA vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-18T00:13:25.000000Z"}, {"uuid": "db5e352f-5409-4af8-9513-305b8ccdcf32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33688", "type": "seen", "source": "https://t.me/cibsecurity/46045", "content": "\u203c CVE-2022-33688 \u203c\n\nSensitive information exposure vulnerability in EventType in SecTelephonyProvider prior to SMR Jul-2022 Release 1 allows local attackers with log access permission to get IMSI through device log.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:36:34.000000Z"}, {"uuid": "8e2f3fbb-e981-49d8-8e30-4a6f7ff7ebcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33687", "type": "seen", "source": "https://t.me/cibsecurity/46034", "content": "\u203c CVE-2022-33687 \u203c\n\nExposure of Sensitive Information in telephony-common.jar prior to SMR Jul-2022 Release 1 allows local attackers to access IMSI via log.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:36:20.000000Z"}, {"uuid": "8ee65bb7-0956-4265-95c9-1de750205855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3368", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7007", "content": "#exploit\n1. CVE-2022-3368:\nArbitrary file move bug in Avira Security\nhttps://github.com/Wh04m1001/CVE-2022-3368\n\n2. CVE-2022-27502:\nRealVNC server &lt;6.9.0 DLL Hijacking Exploit\nhttps://github.com/alirezac0/CVE-2022-27502", "creation_timestamp": "2022-10-19T11:03:01.000000Z"}]}