{"vulnerability": "CVE-2023-38389", "sightings": [{"uuid": "b031a720-8bd0-4aff-9433-82be532c3acf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/hydral0gs/1494", "content": "CVE-2023-38388\nMass Exploit - CVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\nDork : inurl: wp-content/plugins/jupiterx-core/\nPOC exploit", "creation_timestamp": "2023-08-30T11:33:17.000000Z"}, {"uuid": "90338647-e7a0-427c-bf8a-e185c51ea279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4999", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\nURL\uff1ahttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-25T23:12:30.000000Z"}, {"uuid": "d581ca8f-fbb0-484c-aa35-8e63ba80a330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/bh_cat/30", "content": "", "creation_timestamp": "2023-08-29T21:20:03.000000Z"}, {"uuid": "59fa0199-99e0-4aa3-9464-a59444c0251d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "Telegram/nVGpCCGFJfFBbMqbuDDb7uj5pTNZK0IVOOf9utDz1IH_1YA", "content": "", "creation_timestamp": "2024-01-15T11:51:58.000000Z"}, {"uuid": "b4827d1c-4aac-49c7-b152-aa1ce27d2596", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "Telegram/_-2yCzX9XNA59xLVISXtaEHHGZFKO07z2rd05VhSEtgb", "content": "", "creation_timestamp": "2023-08-30T11:33:17.000000Z"}, {"uuid": "4de972da-5002-41d0-a708-e38e7a2a18a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3175", "content": "Hackers Factory \n\nCVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\n\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\nShodan Dorks\n\nhttps://github.com/HernanRodriguez1/Dorks-Shodan-2023\n\nA modern tool written in Python that automates your xss findings.\n\nhttps://github.com/faiyazahmad07/xss_vibes\n\nAn open-source intelligence (OSINT) analysis tool leveraging GPT-powered embeddings and vector search engines for efficient data processing\n\nhttps://github.com/estebanpdl/osintgpt\n\nThe only graphql wordlists you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.\n\nhttps://github.com/Escape-Technologies/graphql-wordlist\n\nNucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications\n\nhttps://github.com/0xKayala/NucleiFuzzer\n\nTunnlTo is a lightweight, fast, Windows WireGuard VPN client built for split tunneling.\n\nhttps://github.com/TunnlTo/desktop-app\n\nA list of writeups from the Google VRP Bug Bounty program\n\nhttps://github.com/xdavidhu/awesome-google-vrp-writeups\n\nReading an Arbitrary ThinkPHP 5.X File.\n\nhttps://github.com/momika233/TP5_Arbitrary_file_read/blob/main/TP5_Arbitrary_file_read.yaml\n\nA simple utility to perform reverse WHOIS lookups using whoisxml API\n\nhttps://github.com/devanshbatham/revwhoix\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-02T10:33:45.000000Z"}, {"uuid": "ec3141b5-a159-4672-8bec-fc3fd77277af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3170", "content": "Hackers Factory \n\nOSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines\n\nhttps://github.com/rodolfomarianocy/OSCP-Tricks-2023\n\nAwesome list of keywords for Threat Hunting sessions\n\nhttps://github.com/mthcht/ThreatHunting-Keywords\n\nA Curated list of Awesome Python Scripts that Automate Stuffs.\n\nhttps://github.com/hastagAB/Awesome-Python-Scripts\n\nCVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\n\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\nSimple EDR that injects a DLL into a process to place a hook on specific Windows API\n\nhttps://github.com/Helixo32/SimpleEDR\n\nCobalt Strike Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique\n\nhttps://github.com/ewby/Mockingjay_BOF\n\nRemote Shellcode Injector\n\nhttps://github.com/florylsk/NtRemoteLoad\n\nA Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.\n\nhttps://github.com/almandin/krbjack\n\nDebugAmsi\n\nDebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.\n\ngithub.com/MzHmO/DebugAmsi\n\nPOC of the CVE-2023-39063\n\nhttps://github.com/AndreGNogueira/CVE-2023-39063 \n\nICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode\n\nhttps://github.com/Tricker-z/CoFuzz\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-28T18:21:49.000000Z"}, {"uuid": "f81e6ef3-c823-4ac5-964f-2ff70bc46ccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1716", "content": "CVE-2023-38388\nMass Exploit - CVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\nDork : inurl: wp-content/plugins/jupiterx-core/\nPOC exploit", "creation_timestamp": "2023-08-29T17:30:41.000000Z"}, {"uuid": "ebf509e1-f51b-4968-bf39-46d8822c88de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "Telegram/aNBNwC3LqvhfS3xWgK9JoNqSxDpP_Nhnlu2qMp5ab4fj1A", "content": "", "creation_timestamp": "2024-01-16T18:04:27.000000Z"}, {"uuid": "0a6847e5-e36d-4e43-82b4-8117e6cf9821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "Telegram/K31ufyBCOheiH5zrjD5YsNz-6uFniQWkP1bYzp0qVw3bJv9k", "content": "", "creation_timestamp": "2024-11-22T08:00:13.000000Z"}, {"uuid": "54abb700-4086-455e-ab7e-8a11fc596b71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "Telegram/iqLSoyttquXsvqmb_GzoQ077CrhYNJaM3BJRNf5DCmByEVqG", "content": "", "creation_timestamp": "2024-11-22T08:00:14.000000Z"}, {"uuid": "f56ddd00-124e-4548-88fb-bf655d0b76a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "seen", "source": "Telegram/AB2bOACOtIPEwgSY9b_jMaZBmH53gvFTnSXIOuBOso_udVo", "content": "", "creation_timestamp": "2023-09-01T03:47:43.000000Z"}, {"uuid": "a2d76532-fb46-4a66-8e51-341985f74bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/327053", "content": "{\n  \"Source\": \"https://spy.gen.tr/forum/\",\n  \"Content\": \"WP PoC CVE-2023-38389\", \n  \"author\": \" (MrSynox)\",\n  \"Detection Date\": \"30 Aug 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-08-30T22:18:39.000000Z"}, {"uuid": "5fa0b1f8-e89d-438c-ae93-256c7c22f2d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1077", "content": "CVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover", "creation_timestamp": "2024-09-17T21:30:02.000000Z"}, {"uuid": "01509d92-3c25-4681-b6b2-491a9b2d7aa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8928", "content": "#exploit\n1. CVE-2023-38389:\nWordpress JupiterX Core - Unauthenticated Account Takeover\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\n2. CVE-2023-35150:\nArbitrary Code Injection in XWiki*org XWiki\nhttps://www.zerodayinitiative.com/blog/2023/8/22/cve-2023-35150-arbitrary-code-injection-in-xwikiorg-xwiki", "creation_timestamp": "2023-08-28T11:01:00.000000Z"}, {"uuid": "786ded82-7bad-46e4-a5f8-720e60bef1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/5439", "content": "#Exploit #Wordpress #JupiterX #Plugin\nWordpress JupiterX Core Plugin Unauthenticated Account Takeover Vuln\n\nDork : inurl: wp-content/plugins/jupiterx-core/\n\n\u0646\u06a9\u062a\u0647: \u0628\u0627 \u067e\u0627\u06cc\u062a\u0648\u0646 2.7 \u0627\u062c\u0631\u0627 \u06a9\u0646\u06cc\u062f \u062f\u0631 \u063a\u06cc\u0631 \u0627\u06cc\u0646 \u0635\u0648\u0631\u062a \u0628\u0627 \u0627\u0631\u0631\u0648\u0631 \u0645\u0648\u0627\u062c\u0647 \u0645\u06cc\u0634\u06cc\u062f.\n\nShared By XP4\n\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\nIR0Day.Today Bax\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-08-30T11:55:42.000000Z"}, {"uuid": "73da8683-da90-4f1b-90b9-66f81af65c9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/682", "content": "CVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\n\nA relatively new and quite effective exploit, designed for unauthorized authentication with subsequent takeover of a worldpress account. Based on vulnerabilities in the third-party add-on JupiterX Core. Vulnerable machines can be found using the following google door: inurl: wp-content/plugins/jupiterx-core/\n\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC", "creation_timestamp": "2024-11-22T09:56:56.000000Z"}]}