{"vulnerability": "CVE-2022-4842", "sightings": [{"uuid": "911c08d2-7bac-4ff5-8b05-af41fd42e24c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48425", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5601", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48425\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs.\n\ud83d\udccf Published: 2023-03-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-26T19:56:45.158Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/fs/ntfs3?id=467333af2f7b95eeaa61a5b5369a80063cd971fd\n2. https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=467333af2f7b95eeaa61a5b5369a80063cd971fd\n3. https://security.netapp.com/advisory/ntap-20230413-0006/", "creation_timestamp": "2025-02-26T20:24:55.000000Z"}, {"uuid": "d5ad7143-3aac-42b8-8ed2-b928bb1bcd5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48422", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/7497", "content": "\u200b\u041e\u0441\u0432\u0435\u0436\u0430\u0435\u0442 \u0438\u043d\u043e\u0433\u0434\u0430, \u0432 \u0437\u043d\u043e\u0439 \u0445\u043e\u043b\u043e\u0434\u043d\u0430\u044f \u0432\u043e\u0434\u0430. PoC CVE-2022-48422. OnlyOffice 7.3\n\n\u041a\u0443, \u043a\u0438\u0431\u0435\u0440\u0440\u0435\u043a\u0440\u0443\u0442\u044b. \u0414\u0430\u043d\u043d\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u043f\u043e\u0441\u0432\u044f\u0449\u0435\u043d\u0430 CVE-2022-48422. \u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 ONLYOFFICE-DocumentServer-7.3.0 \u0438 \u0434\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0435\u043b\u0435\u0433\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0442\u0440\u043e\u044f\u043d\u0441\u043a\u043e\u0433\u043e \u043a\u043e\u043d\u044f libgcc_s.so.1 \u0432 \u0442\u0435\u043a\u0443\u0449\u0435\u043c \u0440\u0430\u0431\u043e\u0447\u0435\u043c \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043b\u044e\u0431\u043e\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 ONLYOFFICE. \u041e\u0434\u043d\u0430\u043a\u043e, \u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0447\u0442\u0438\u0432\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u043e\u043f\u0440\u043e\u0431\u0443\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a\u0440\u0430\u0448. \u0414\u0443\u043c\u0430\u044e, \u044d\u0442\u043e \u044f\u0432\u044f\u043b\u0435\u0442\u0441\u044f \u0445\u043e\u0440\u043e\u0448\u0435\u0439 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u043e\u0439 \u0434\u043b\u044f \u043f\u044b\u0432\u043d\u0430 \u0440\u0438\u043b \u043a\u0435\u0439\u0441\u043e\u0432.\n\n\ud83d\udccc \u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435\n\n#reverse #cve #pwn", "creation_timestamp": "2023-06-26T17:17:14.000000Z"}, {"uuid": "3f8fb391-0317-4a3c-ab36-5823c04dc5c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48422", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5706", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48422\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ONLYOFFICE Docs through 7.3 on certain Linux distributions allows local users to gain privileges via a Trojan horse libgcc_s.so.1 in the current working directory, which may be any directory in which an ONLYOFFICE document is located.\n\ud83d\udccf Published: 2023-03-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T16:12:44.384Z\n\ud83d\udd17 References:\n1. https://forum.onlyoffice.com/t/security-hole-library-from-cwd/3302", "creation_timestamp": "2025-02-27T16:26:01.000000Z"}, {"uuid": "0c7a2a80-5377-4390-8b3b-e866b35002eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48424", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48424\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.\n\ud83d\udccf Published: 2023-03-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T16:17:48.210Z\n\ud83d\udd17 References:\n1. https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3\n2. https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4f1dc7d9756e66f3f876839ea174df2e656b7f79\n3. https://security.netapp.com/advisory/ntap-20230505-0002/", "creation_timestamp": "2025-02-27T16:25:55.000000Z"}, {"uuid": "970a061b-242f-4b5a-9659-fadf5bb81b12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48423", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5705", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48423\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.\n\ud83d\udccf Published: 2023-03-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T16:14:52.066Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54e45702b648b7c0000e90b3e9b890e367e16ea8\n2. https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3\n3. https://security.netapp.com/advisory/ntap-20230505-0003/", "creation_timestamp": "2025-02-27T16:26:00.000000Z"}, {"uuid": "435661bf-9075-4ee2-b5d1-904acda37771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48426", "type": "seen", "source": "https://t.me/cibsecurity/60810", "content": "\u203c CVE-2022-48426 \u203c\n\nIn JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possible\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-27T20:50:11.000000Z"}, {"uuid": "5b5aa584-6e5b-41ad-9934-9d8c6e3d4f12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48429", "type": "seen", "source": "https://t.me/cibsecurity/60817", "content": "\u203c CVE-2022-48429 \u203c\n\nIn JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possible\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-27T20:50:18.000000Z"}, {"uuid": "be177496-73e6-4c13-98da-eafbd7acbadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48424", "type": "seen", "source": "https://t.me/cibsecurity/60289", "content": "\u203c CVE-2022-48424 \u203c\n\nIn the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-19T07:02:59.000000Z"}, {"uuid": "7631925b-c1ad-433b-b2ad-50afc3361fb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4842", "type": "seen", "source": "https://t.me/cibsecurity/56447", "content": "\u203c CVE-2022-4842 \u203c\n\nA flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T22:30:42.000000Z"}]}