{"vulnerability": "CVE-2023-1326", "sightings": [{"uuid": "a500e475-220f-4ed9-ac93-50fba1b8a66b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1326", "type": "seen", "source": "https://t.me/arpsyndicate/2929", "content": "#ExploitObserverAlert\n\nCVE-2023-1326\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-1326. A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-19T13:37:57.000000Z"}, {"uuid": "fe2dbc46-9090-4d34-9a07-b3a524e8ec2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1326", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6086", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA proof of concept for CVE-2023\u20131326 in apport-cli 2.26.0\nURL\uff1ahttps://github.com/diego-tella/CVE-2023-1326-PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-06T00:09:52.000000Z"}, {"uuid": "9ff54501-e9bd-4d37-8c50-dd999dfa7c50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1326", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9543", "content": "#exploit\n1. CVE-2023-1326:\nPrivilege escalation in apport-cli 2.26.0\nhttps://github.com/diego-tella/CVE-2023-1326-PoC\n\n2. CVE-2023-45866:\nUnauthenticated Bluetooth keystroke-injection in Android, Linux, macOS and iOS\nhttps://ift.tt/BHxK2mO\n]-&gt; https://github.com/pentestfunctions/BlueDucky\n\n3. CVE-2023-24893:\nVSCode RCE\nhttps://blog.solidsnail.com/posts/vscode-shell-integ-rce", "creation_timestamp": "2025-01-05T12:40:52.000000Z"}, {"uuid": "57f49891-8ade-44b1-851a-d640fc712691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1326", "type": "seen", "source": "https://t.me/arpsyndicate/2879", "content": "#ExploitObserverAlert\n\nCVE-2023-1326\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-1326. A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-16T19:53:47.000000Z"}, {"uuid": "fef7c545-c176-4be7-aa79-bf782fdd67c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1326", "type": "seen", "source": "https://t.me/arpsyndicate/1525", "content": "#ExploitObserverAlert\n\nCVE-2023-1326\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-1326. A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-06T23:32:26.000000Z"}, {"uuid": "3bcf96dd-d1a4-4c8f-94b9-b3b4d8e306e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1326", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2216", "content": "#exploit\nCVE-2023-1326:\nPrivilege escalation in apport-cli 2.26.0\nhttps://github.com/diego-tella/CVE-2023-1326-PoC", "creation_timestamp": "2024-08-16T08:56:09.000000Z"}]}