{"vulnerability": "CVE-2022-4719", "sightings": [{"uuid": "d748c5de-bf7f-4886-bb98-a45c9ebd101a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47197", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10284", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-47197\n\ud83d\udd25 CVSS Score: 9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `codeinjection_foot` for a post.\n\ud83d\udccf Published: 2023-01-19T17:02:15.814Z\n\ud83d\udccf Modified: 2025-04-03T17:00:32.324Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686", "creation_timestamp": "2025-04-03T17:35:39.000000Z"}, {"uuid": "d0517a5c-8b83-40b8-bb5f-a7fc8ce53522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4719", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11159", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4719\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_0, Vector: CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5.\n\ud83d\udccf Published: 2022-12-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-09T20:39:58.256Z\n\ud83d\udd17 References:\n1. https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09\n2. https://github.com/ikus060/rdiffweb/commit/bc4bed89affcba71251fe54ed10639da9d392c1d", "creation_timestamp": "2025-04-09T20:48:22.000000Z"}, {"uuid": "67903e2c-41ac-4fc6-9005-d6c83f372c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47195", "type": "seen", "source": "https://t.me/cibsecurity/56719", "content": "\u203c CVE-2022-47195 \u203c\n\nAn insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `facebook` field for a user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-19T20:22:07.000000Z"}, {"uuid": "9a136101-bde0-4f9e-a805-874dc94d6291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4719", "type": "seen", "source": "https://t.me/cibsecurity/55415", "content": "\u203c CVE-2022-4719 \u203c\n\nBusiness Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-27T18:13:37.000000Z"}, {"uuid": "b7db6320-4616-492a-976f-f7beb535baf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47191", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/2163", "content": "Thunderstorm is a modular framework to exploit UPS devices.  For now, only the CS-141 and NetMan 204 exploits will be available. The beta version of the framework will be released on the future.\n  CVE  Thunderstorm is currently capable of exploiting the following CVE:    CVE-2022-47186 \u2013 Unrestricted file Upload # [CS-141]  CVE-2022-47187 \u2013 Cross-Site Scripting via File upload # [CS-141]  CVE-2022-47188 \u2013 Arbitrary local file read via file upload # [CS-141]  CVE-2022-47189 \u2013 Denial of Service via file upload # [CS-141]  CVE-2022-47190 \u2013 Remote Code Execution (https://www.kitploit.com/search/label/Remote%20Code%20Execution) via file upload # [CS-141]  CVE-2022-47191 \u2013 Privilege Escalation (https://www.kitploit.com/search/label/Privilege%20Escalation) via file upload # [CS-141]  CVE-2022-47192 \u2013 Admin password reset via file upload # [CS-141]  CVE-2022-47891 \u2013 Admin password reset # [NetMan 204]  CVE-2022-47892 \u2013 Sensitive Information Disclosure (https://www.kitploit.com/search/label/Information%20Disclosure) # [NetMan 204]  CVE-2022-47893 \u2013 Remote Code Execution via file upload # [NetMan 204]    Requirements    Python 3  Install requirements.txt    Download  It is recommended to clone the complete repository or download the zip file.  You can do this by running the following command:  git clone https://github.com/JoelGMSec/Thunderstorm\n  Also, you probably need to download the original and the custom firmware.  You can download all requirements from here:  https://darkbyte.net/links/thunderstorm.php  Usage  - To be disclosed\n\n  The detailed guide of use can be found at the following link:    To be disclosed    License  This project is licensed under the GNU 3.0 license - see the LICENSE file for more details.  Credits and Acknowledgments  This tool has been created and designed from scratch by Joel G\u00e1mez Molina // @JoelGMSec  Contact  This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it.  For more information, you can find me on Twitter as @JoelGMSec (https://twitter.com/JoelGMSec) and on my blog darkbyte.net (https://darkbyte.net/).  \n\nDownload Thunderstorm (https://github.com/JoelGMSec/Thunderstorm)", "creation_timestamp": "2023-03-06T18:07:35.000000Z"}, {"uuid": "a75cabda-ff42-4fa1-8467-2d9f865de2f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47192", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/2163", "content": "Thunderstorm is a modular framework to exploit UPS devices.  For now, only the CS-141 and NetMan 204 exploits will be available. The beta version of the framework will be released on the future.\n  CVE  Thunderstorm is currently capable of exploiting the following CVE:    CVE-2022-47186 \u2013 Unrestricted file Upload # [CS-141]  CVE-2022-47187 \u2013 Cross-Site Scripting via File upload # [CS-141]  CVE-2022-47188 \u2013 Arbitrary local file read via file upload # [CS-141]  CVE-2022-47189 \u2013 Denial of Service via file upload # [CS-141]  CVE-2022-47190 \u2013 Remote Code Execution (https://www.kitploit.com/search/label/Remote%20Code%20Execution) via file upload # [CS-141]  CVE-2022-47191 \u2013 Privilege Escalation (https://www.kitploit.com/search/label/Privilege%20Escalation) via file upload # [CS-141]  CVE-2022-47192 \u2013 Admin password reset via file upload # [CS-141]  CVE-2022-47891 \u2013 Admin password reset # [NetMan 204]  CVE-2022-47892 \u2013 Sensitive Information Disclosure (https://www.kitploit.com/search/label/Information%20Disclosure) # [NetMan 204]  CVE-2022-47893 \u2013 Remote Code Execution via file upload # [NetMan 204]    Requirements    Python 3  Install requirements.txt    Download  It is recommended to clone the complete repository or download the zip file.  You can do this by running the following command:  git clone https://github.com/JoelGMSec/Thunderstorm\n  Also, you probably need to download the original and the custom firmware.  You can download all requirements from here:  https://darkbyte.net/links/thunderstorm.php  Usage  - To be disclosed\n\n  The detailed guide of use can be found at the following link:    To be disclosed    License  This project is licensed under the GNU 3.0 license - see the LICENSE file for more details.  Credits and Acknowledgments  This tool has been created and designed from scratch by Joel G\u00e1mez Molina // @JoelGMSec  Contact  This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it.  For more information, you can find me on Twitter as @JoelGMSec (https://twitter.com/JoelGMSec) and on my blog darkbyte.net (https://darkbyte.net/).  \n\nDownload Thunderstorm (https://github.com/JoelGMSec/Thunderstorm)", "creation_timestamp": "2023-03-06T18:07:35.000000Z"}, {"uuid": "0590e9b3-47bb-4329-9c13-d556845068a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47190", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/2163", "content": "Thunderstorm is a modular framework to exploit UPS devices.  For now, only the CS-141 and NetMan 204 exploits will be available. The beta version of the framework will be released on the future.\n  CVE  Thunderstorm is currently capable of exploiting the following CVE:    CVE-2022-47186 \u2013 Unrestricted file Upload # [CS-141]  CVE-2022-47187 \u2013 Cross-Site Scripting via File upload # [CS-141]  CVE-2022-47188 \u2013 Arbitrary local file read via file upload # [CS-141]  CVE-2022-47189 \u2013 Denial of Service via file upload # [CS-141]  CVE-2022-47190 \u2013 Remote Code Execution (https://www.kitploit.com/search/label/Remote%20Code%20Execution) via file upload # [CS-141]  CVE-2022-47191 \u2013 Privilege Escalation (https://www.kitploit.com/search/label/Privilege%20Escalation) via file upload # [CS-141]  CVE-2022-47192 \u2013 Admin password reset via file upload # [CS-141]  CVE-2022-47891 \u2013 Admin password reset # [NetMan 204]  CVE-2022-47892 \u2013 Sensitive Information Disclosure (https://www.kitploit.com/search/label/Information%20Disclosure) # [NetMan 204]  CVE-2022-47893 \u2013 Remote Code Execution via file upload # [NetMan 204]    Requirements    Python 3  Install requirements.txt    Download  It is recommended to clone the complete repository or download the zip file.  You can do this by running the following command:  git clone https://github.com/JoelGMSec/Thunderstorm\n  Also, you probably need to download the original and the custom firmware.  You can download all requirements from here:  https://darkbyte.net/links/thunderstorm.php  Usage  - To be disclosed\n\n  The detailed guide of use can be found at the following link:    To be disclosed    License  This project is licensed under the GNU 3.0 license - see the LICENSE file for more details.  Credits and Acknowledgments  This tool has been created and designed from scratch by Joel G\u00e1mez Molina // @JoelGMSec  Contact  This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it.  For more information, you can find me on Twitter as @JoelGMSec (https://twitter.com/JoelGMSec) and on my blog darkbyte.net (https://darkbyte.net/).  \n\nDownload Thunderstorm (https://github.com/JoelGMSec/Thunderstorm)", "creation_timestamp": "2023-03-06T18:07:35.000000Z"}, {"uuid": "b45a3857-e7e8-4024-8f18-3776d41195b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47194", "type": "seen", "source": "https://t.me/cibsecurity/56732", "content": "\u203c CVE-2022-47194 \u203c\n\nAn insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `twitter` field for a user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-19T20:22:28.000000Z"}, {"uuid": "31f56c0f-e1c3-47c0-a1cd-b0e8d89b62b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47197", "type": "seen", "source": "https://t.me/cibsecurity/56726", "content": "\u203c CVE-2022-47197 \u203c\n\nAn insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `codeinjection_foot` for a post.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-19T20:22:19.000000Z"}]}