{"vulnerability": "CVE-2023-2940", "sightings": [{"uuid": "20716785-2092-4914-a790-67b9cf23bac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29406", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5768", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aImplementa\u00e7\u00f5es de servidores HTML em GO para an\u00e1lise da vulnerabilidade CVE-2023-29406.\nURL\uff1ahttps://github.com/LuizGustavoP/EP3_Redes\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-11-11T16:33:10.000000Z"}, {"uuid": "d2ad15c5-fe37-450a-bffb-c4a74f0e702a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29407", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lydr6qjrddo2", "content": "", "creation_timestamp": "2025-09-08T17:49:51.889068Z"}, {"uuid": "ac6346fa-faa6-43f6-a8f7-70a7efea6389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29409", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4957", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1a CVE-2023-29409 reproducer\nURL\uff1ahttps://github.com/mateusz834/CVE-2023-29409\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-21T17:13:42.000000Z"}, {"uuid": "a4fd9888-feae-426c-b3b0-d1b0fba00afc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29409", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4956", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1a CVE-2023-29409 reproducer\nURL\uff1ahttps://github.com/mateusz834/CVE-2023-29409\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-21T16:06:49.000000Z"}, {"uuid": "f1fdf2c9-41ac-4c9d-9d89-a92116e06a76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29402", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/241", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29402\n\ud83d\udd39 Description: The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).\n\ud83d\udccf Published: 2023-06-08T20:19:04.483Z\n\ud83d\udccf Modified: 2025-01-06T21:14:36.576Z\n\ud83d\udd17 References:\n1. https://go.dev/issue/60167\n2. https://go.dev/cl/501226\n3. https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ\n4. https://pkg.go.dev/vuln/GO-2023-1839\n5. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/\n6. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/\n7. https://security.gentoo.org/glsa/202311-09", "creation_timestamp": "2025-01-06T21:36:52.000000Z"}, {"uuid": "7d2ed518-76bd-4290-90c2-59afa0f487f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29400", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2940", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29400\n\ud83d\udd39 Description: Templates containing actions in unquoted HTML attributes (e.g. \"attr={{.}}\") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.\n\ud83d\udccf Published: 2023-05-11T15:29:24.874Z\n\ud83d\udccf Modified: 2025-01-24T16:47:46.724Z\n\ud83d\udd17 References:\n1. https://go.dev/issue/59722\n2. https://go.dev/cl/491617\n3. https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU\n4. https://pkg.go.dev/vuln/GO-2023-1753", "creation_timestamp": "2025-01-24T17:04:54.000000Z"}, {"uuid": "261a34f9-90fc-444c-98ba-a074b073407b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29408", "type": "seen", "source": "https://t.me/cibsecurity/67621", "content": "\u203c CVE-2023-29408 \u203c\n\nThe TIFF decoder does not place a limit on the size of compressed tile data. A maliciously-crafted image can exploit this to cause a small image (both in terms of pixel width/height, and encoded size) to make the decoder decode large amounts of compressed data, consuming excessive memory and CPU.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T00:39:37.000000Z"}, {"uuid": "080a9d6d-f49c-4eed-a269-f3b6e4917523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29407", "type": "seen", "source": "https://t.me/cibsecurity/67620", "content": "\u203c CVE-2023-29407 \u203c\n\nA maliciously-crafted image can cause excessive CPU consumption in decoding. A tiled image with a height of 0 and a very large width can cause excessive CPU consumption, despite the image size (width * height) appearing to be zero.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T00:39:36.000000Z"}, {"uuid": "b31fc4da-eb7c-4ec2-a2e4-be6143588f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29409", "type": "seen", "source": "https://t.me/cibsecurity/67618", "content": "\u203c CVE-2023-29409 \u203c\n\nExtremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to &lt;= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T00:39:34.000000Z"}, {"uuid": "c664875b-44f8-4d2c-9bb0-f195f5acf433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29403", "type": "seen", "source": "https://t.me/cibsecurity/65082", "content": "\u203c CVE-2023-29403 \u203c\n\nOn Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-09T00:26:14.000000Z"}, {"uuid": "6140a405-ea89-4b9b-ba8f-ee1771f4cdff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29400", "type": "seen", "source": "https://t.me/cibsecurity/63899", "content": "\u203c CVE-2023-29400 \u203c\n\nTemplates containing actions in unquoted HTML attributes (e.g. \"attr={{.}}\") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-11T20:15:26.000000Z"}, {"uuid": "e55e30a2-9f37-4806-bee8-98980bb9f3f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29406", "type": "seen", "source": "https://t.me/cibsecurity/66452", "content": "\u203c CVE-2023-29406 \u203c\n\nThe HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T00:29:51.000000Z"}, {"uuid": "e29c9209-a27d-4f8c-b977-f59c5c7aa66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29409", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8906", "content": "#exploit\n1. Full exploit chain for Faronics-DeepFreeze-8\nhttps://github.com/snowcra5h/Faronics-DeepFreeze-8-Exploit\n\n2. CVE-2023-29409:\nExtremely large RSA keys in certificate chains\nhttps://github.com/mateusz834/CVE-2023-29409", "creation_timestamp": "2023-08-24T18:39:21.000000Z"}]}