{"vulnerability": "CVE-2023-24804", "sightings": [{"uuid": "fab6960c-807f-4209-9063-f136fb1d9050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24804", "type": "seen", "source": "Telegram/yNx8xcOMzym-uwmk69v7zW6sw7sXyn5gg1t71GI9dnHTf28", "content": "", "creation_timestamp": "2023-02-14T09:13:20.000000Z"}, {"uuid": "a8ba2344-5c57-47f5-97d4-349cd8de6036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24804", "type": "published-proof-of-concept", "source": "Telegram/uv1uFiDWKsOxGZBkwk8tIqSTL_hUcb07tN8YiiPHubAxEuU", "content": "", "creation_timestamp": "2023-02-27T18:37:22.000000Z"}, {"uuid": "e292a56d-0b23-44f9-bc31-f3920d24b083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24804", "type": "seen", "source": "https://t.me/cibsecurity/58015", "content": "\u203c CVE-2023-24804 \u203c\n\nThe ownCloud Android app allows ownCloud users to access, share, and edit files and folders. Prior to version 3.0, the app has an incomplete fix for a path traversal issue and is vulnerable to two bypass methods. The bypasses may lead to information disclosure when uploading the app\u00e2\u20ac\u2122s internal files, and to arbitrary file write when uploading plain text files (although limited by the .txt extension). Version 3.0 fixes the reported bypasses.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-13T20:30:02.000000Z"}, {"uuid": "e568c6da-5e28-48c4-9aa0-d915915279d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24804", "type": "seen", "source": "https://t.me/androidMalware/1781", "content": "SQL injection vulnerabilities in Owncloud Android app - CVE-2023-24804, CVE-2023-23948\nThe Owncloud Android app uses content providers to manage its data. The provider FileContentProvider has SQL injection vulnerabilities that allow malicious applications or users in the same device to obtain internal information of the app\nhttps://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/", "creation_timestamp": "2023-02-17T00:09:16.000000Z"}, {"uuid": "3c69f258-db54-4cb6-abb7-67ed1d7de411", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24804", "type": "seen", "source": "https://t.me/thebugbountyhunter/7056", "content": "SQL injection vulnerabilities in Owncloud Android app - CVE-2023-24804, CVE-2023-23948\nThe Owncloud Android app uses content providers to manage its data. The provider FileContentProvider has SQL injection vulnerabilities that allow malicious applications or users in the same device to obtain internal information of the app\nhttps://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/", "creation_timestamp": "2023-02-17T03:23:35.000000Z"}, {"uuid": "7c6ce900-818b-45b6-9961-183a5ef0a66f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24804", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7828", "content": "#exploit\n1. Tips on how to write exploit scripts\nhttps://github.com/rizemon/exploit-writing-for-oswe\n\n2. Exploiting a SUID logic bug in readline\nhttps://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline\n\n3. CVE-2023-24804, CVE-2023-23948:\nSQL injection vulnerabilities in Owncloud Android app\nhttps://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app", "creation_timestamp": "2023-02-26T15:28:42.000000Z"}]}