{"vulnerability": "CVE-2022-38108", "sightings": [{"uuid": "0f2ab54d-464b-4338-94eb-e5d32e0f6192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38108", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "780960cb-11e5-4f17-a9d8-fd62ca67f5bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38108", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:48.000000Z"}, {"uuid": "7318bc86-4ebb-466b-8c8b-1da39fb53383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38108", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:00.000000Z"}, {"uuid": "12dd840a-b18e-454e-a24f-b402fea9a6a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38108", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7849", "content": "#exploit\n1. CVE 2022-22978:\nAuthorization Bypass in RegexRequestMatcher\nhttps://github.com/umakant76705/CVE-2022-22978\n\n2. Modicon M580/M340 Safety Protection bypass and utils\nhttps://github.com/0xedh/schneider_plc_exploit\n\n3. CVE-2022-38108:\nRCE in SolarWinds Network Performance Monitor\nhttps://www.zerodayinitiative.com/blog/2023/2/27/cve-2022-38108-rce-in-solarwinds-network-performance-monitor\n\n4. PHP SplDoublyLinkedList::pop() UAF\nhttps://therealcoiffeur.com/c101010", "creation_timestamp": "2023-03-02T11:02:01.000000Z"}, {"uuid": "378b8713-6079-47a8-b742-0059151c4152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38108", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/solarwinds_amqp_deserialization.rb", "content": "", "creation_timestamp": "2023-03-29T14:49:46.000000Z"}, {"uuid": "89c6175a-0f01-4557-9250-aa14fe5a3baf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38108", "type": "seen", "source": "https://t.me/cibsecurity/51906", "content": "\u203c CVE-2022-38108 \u203c\n\nSolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-21T09:13:37.000000Z"}]}