{"vulnerability": "CVE-2023-37265", "sightings": [{"uuid": "9a18dde8-fe4d-4cce-b2ca-373695fcb707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37265", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1056", "content": "AuthBypass via Internal IP", "creation_timestamp": "2024-09-17T21:30:02.000000Z"}, {"uuid": "d6220fe1-4c8d-40f3-9591-f285803f12c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37265", "type": "seen", "source": "Telegram/DhBuM5h9ZembCAXJLb1SO10em_tONhvTPWBycf14R0dULg", "content": "", "creation_timestamp": "2023-10-17T17:40:39.000000Z"}, {"uuid": "7438b698-ff55-49e5-a062-154cff6ff8e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37265", "type": "seen", "source": "https://t.me/KomunitiSiber/945", "content": "Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software\nhttps://thehackernews.com/2023/10/critical-vulnerabilities-uncovered-in.html\n\nTwo critical security flaws discovered in the open-source\u00a0CasaOS\u00a0personal cloud software could be successfully exploited by attackers to achieve arbitrary code execution and take over susceptible systems.\nThe vulnerabilities, tracked as\u00a0CVE-2023-37265\u00a0and\u00a0CVE-2023-37266, both carry a CVSS score of 9.8 out of a maximum of 10.\nSonar security researcher Thomas Chauchefoin, who discovered the bugs,\u00a0", "creation_timestamp": "2023-10-17T17:35:31.000000Z"}, {"uuid": "c2161aaa-4e25-488e-8c74-57632a7cf112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37265", "type": "seen", "source": "https://t.me/cibsecurity/66861", "content": "\u203c CVE-2023-37265 \u203c\n\nCasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T00:45:32.000000Z"}]}