{"vulnerability": "CVE-2023-38836", "sightings": [{"uuid": "aadca511-8e50-4644-a55c-6d57e0780bc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "0cc9e447-034c-4949-9e05-f7c95cb74d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:56.000000Z"}, {"uuid": "52d72187-49a3-4738-ab3c-2131628eade6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "f957bf18-cdd2-434c-babe-df472e0fd272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/black_69_here/137", "content": "CVE-2023-38836 \u2705\n\nExploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nusage: exp.py [-h] [-u URL] [-l USER] [-p PASSWD]\n\nExploit for CVE-2023-38836\n\noptions:\n  -h, --help            show this help message and exit\n  -u URL,\n --url URL  website url\n  -l USER, \n--user USER  admin username\n  -p PASSWD,\n --passwd PASSWD\n  admin password\n\n\nJoin : @flash_kiss", "creation_timestamp": "2023-08-19T21:31:05.000000Z"}, {"uuid": "a61335c1-aab4-487a-bf67-bf3730bcd1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/cve_2023_38836_boidcms.rb", "content": "", "creation_timestamp": "2024-03-01T05:48:56.000000Z"}, {"uuid": "c68ef29f-45d8-48a2-baa0-516af04b306a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "Telegram/dbvuxNNZ-8bCv4RZf6xv5uwDtZ_cnVdQB-PXidN-Enzi", "content": "", "creation_timestamp": "2023-08-19T19:31:02.000000Z"}, {"uuid": "6c10cc84-ab54-4ea2-acbd-29818f321fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/8016", "content": "CVE ID : CVE-2023-38836\nSystem : BoidCMS v.2.0.0\nType : \ud80c\udda3 file upload \ud80c\udda3 \n\nExploiting\n\u0637\u0631\u064a\u0642\u0629 \u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 :\n\npython3 CVE-2023-38836.py", "creation_timestamp": "2024-06-19T01:30:22.000000Z"}, {"uuid": "3156b836-7e5b-4a17-9f38-58add8800c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/108", "content": "CVE ID : CVE-2023-38836\nSystem : BoidCMS v.2.0.0\nType : \ud80c\udda3 file upload \ud80c\udda3 \n\nExploiting\n\u0637\u0631\u064a\u0642\u0629 \u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 :\n\npython3 CVE-2023-38836.py", "creation_timestamp": "2024-05-10T18:34:07.000000Z"}, {"uuid": "9c3e40e0-e50b-450d-a2aa-3ccb568ba5a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "Telegram/Oq35BKxnuTzPcMnyUvXmy463sPzD13heVJzjGMfN9RaKXa4m", "content": "", "creation_timestamp": "2024-05-29T20:08:08.000000Z"}, {"uuid": "28001f5b-583d-4145-adb2-d799cfd5f260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/error_troops/276", "content": "CVE-2023-38836 \u2705\n\nExploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nusage: exp.py [-h] [-u URL] [-l USER] [-p PASSWD]\n\nExploit for CVE-2023-38836\n\noptions:\n  -h, --help            show this help message and exit\n  -u URL,\n --url URL  website url\n  -l USER, \n--user USER  admin username\n  -p PASSWD,\n --passwd PASSWD\n  admin password\n\n\nJoin : @flash_kiss", "creation_timestamp": "2023-08-19T21:31:05.000000Z"}, {"uuid": "05186d46-9de1-4ae3-98be-2012ce9977c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/4111", "content": "#ExploitObserverAlert\n\nMSF/exploit_multi/http/cve_2023_38836_boidcms\n\nDESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.", "creation_timestamp": "2024-03-02T06:07:07.000000Z"}, {"uuid": "c21bd240-7884-4705-987c-e35255a8adc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/HackingVidhya/288", "content": "Exploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nhttps://github.com/1337kid/CVE-2023-38836", "creation_timestamp": "2023-08-18T17:51:01.000000Z"}, {"uuid": "99e2aded-d2d3-4e45-a532-9ae3438a0e94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/ev1l_store/958", "content": "CVE-2023-38836 \u2705\n\nExploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nusage: exp.py [-h] [-u URL] [-l USER] [-p PASSWD]\n\nExploit for CVE-2023-38836\n\noptions:\n  -h, --help            show this help message and exit\n  -u URL,\n --url URL  website url\n  -l USER, \n--user USER  admin username\n  -p PASSWD,\n --passwd PASSWD\n  admin password\n\n\nJoin : @flash_kiss", "creation_timestamp": "2023-08-19T21:31:05.000000Z"}, {"uuid": "533a3aef-5828-4ec4-a9b9-91d5d24d16f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/ev1l_store/406", "content": "CVE-2023-38836 \u2705\n\nExploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nusage: exp.py [-h] [-u URL] [-l USER] [-p PASSWD]\n\nExploit for CVE-2023-38836\n\noptions:\n  -h, --help            show this help message and exit\n  -u URL,\n --url URL  website url\n  -l USER, \n--user USER  admin username\n  -p PASSWD,\n --passwd PASSWD\n  admin password\n\n\nJoin : @flash_kiss", "creation_timestamp": "2023-08-19T21:31:05.000000Z"}, {"uuid": "264211c8-e003-41b4-8924-a49bca289f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/BhinnekaSec/485", "content": "CVE-2023-38836 \u2705\n\nExploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nusage: exp.py [-h] [-u URL] [-l USER] [-p PASSWD]\n\nExploit for CVE-2023-38836\n\noptions:\n  -h, --help            show this help message and exit\n  -u URL,\n --url URL  website url\n  -l USER, \n--user USER  admin username\n  -p PASSWD,\n --passwd PASSWD\n  admin password\n\n\nJoin : @flash_kiss", "creation_timestamp": "2023-08-20T02:05:27.000000Z"}, {"uuid": "5bd887e5-7d34-40bb-8708-ab6ae2d3be2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/2963", "content": "Exploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nhttps://github.com/1337kid/CVE-2023-38836", "creation_timestamp": "2023-08-18T17:41:52.000000Z"}, {"uuid": "37aadb27-333e-4918-9472-86e614df4765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/Redscriptteam/1192", "content": "CVE-2023-38836 \u2705\n\nExploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nusage: exp.py [-h] [-u URL] [-l USER] [-p PASSWD]\n\nExploit for CVE-2023-38836\n\noptions:\n\u00a0 -h, --help\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 show this help message and exit\n\u00a0 -u URL, --url URL\u00a0\u00a0\u00a0\u00a0 website url\n\u00a0 -l USER, --user USER\u00a0 admin username\n\u00a0 -p PASSWD, --passwd PASSWD\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 admin password\n\n\nJoin : @vpn809", "creation_timestamp": "2023-09-08T09:52:14.000000Z"}, {"uuid": "b3b1f96a-f21e-482e-a1b7-818d6b7196c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/269", "content": "Exploit for file upload vulnerability in BoidCMS version &lt;=2.0.0\n\nhttps://github.com/1337kid/CVE-2023-38836", "creation_timestamp": "2023-08-18T17:23:51.000000Z"}, {"uuid": "e2a14654-e5a6-4bb0-a122-8aa95c05f5fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "seen", "source": "https://t.me/cibsecurity/68895", "content": "\u203c CVE-2023-38836 \u203c\n\nFile Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code via the GIF header component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-21T20:41:11.000000Z"}, {"uuid": "e5c5228a-744f-4de7-bfe1-ea6b998bce88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/886", "content": "https://github.com/1337kid/CVE-2023-38836\nBoidCMS\n#github", "creation_timestamp": "2023-08-17T07:09:39.000000Z"}, {"uuid": "12f5f01e-1462-4009-9cd7-ca22a0fa2dae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38836", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8865", "content": "#exploit\n1. CVE-2023-3079:\nType confusion in V8 in Google Chrome\nhttps://github.com/mistymntncop/CVE-2023-3079\n\n2. CVE-2023-38836:\nExploit for file upload vulnerability in BoidCMS &lt;=2.0.0\nhttps://github.com/1337kid/CVE-2023-38836", "creation_timestamp": "2023-08-17T12:25:33.000000Z"}]}