{"vulnerability": "CVE-2023-42820", "sightings": [{"uuid": "871e21d4-743f-492e-b689-8c53a2fc9841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5228", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-42820\nURL\uff1ahttps://github.com/wh-gov/CVE-2023-42820\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-27T08:10:17.000000Z"}, {"uuid": "d9f812f4-6456-4b51-b36c-fb97e87b5e84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/127", "content": "\u2604\ufe0fCVE-2023-42820 PoC\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442:\nhttps://github.com/C1ph3rX13/CVE-2023-42820?ysclid=lnnn3ng83n191662763\n\n#cve #exploit #poc", "creation_timestamp": "2023-10-13T13:57:53.000000Z"}, {"uuid": "b7dbae2f-3521-4ebc-a877-11ecf1879eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11645", "content": "\u25a0\u25a1\u25a1\u25a1\u25a1 CVE-2023-42820\n\nJumpServer - Random seed leakage results in the user password being reset.\n\nhttps://github.com/h4m5t/CVE-2023-42820", "creation_timestamp": "2023-09-29T09:17:53.000000Z"}, {"uuid": "a3d3756c-1e0f-46bf-893b-5258e3938cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5413", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aJumpServer \u5821\u5792\u673a\u7efc\u5408\u6f0f\u6d1e\u5229\u7528, CVE-2023-42442 / CVE-2023-42820\nURL\uff1ahttps://github.com/tarimoe/blackjump\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-14T09:36:21.000000Z"}, {"uuid": "5bba98ce-adce-47f3-8f6c-bf2c7b6bb5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3213", "content": "Hackers Factory \n\nInstagram-py performs slick brute force attack on Instagram without any type of password limiting\n\nand also resumes your attack in ease.\n\n\u2014DeathSec\n\nhttps://github.com/deathsec/instagram-py\n\nAn open-source self-hosted purple team management web application.\n\nhttps://github.com/CyberCX-STA/PurpleOps?mibextid=Zxz2cZ\n\nJust some lists of Malware Configs\n\nhttps://github.com/Gi7w0rm/MalwareConfigLists\n\na unique vocabulary that is 90% generated with OpenAI ChatGPT.\n\nhttps://github.com/reewardius/bbFuzzing.txt\n\nCVE-2023-20209\n\nhttps://github.com/0x41-Researcher/CVE-2023-20209\n\nOfficial repo for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts\n\nhttps://github.com/sherdencooper/GPTFuzz\n\nAttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&amp;CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details\n\nhttps://github.com/mrwadams/attackgen\n\nA Proof-Of-Concept for the CVE-2023-43770 vulnerability.\n\nhttps://github.com/s3cb0y/CVE-2023-43770-POC\n\nreverse shell using curl\n\nhttps://github.com/irsl/curlshell\n\nCVE-2023-42820\n\nhttps://github.com/h4m5t/CVE-2023-42820\n\nGoCrack is a management frontend for password cracking tools written in Go\n\nhttps://github.com/mandiant/gocrack\n\nAsk a TGS on behalf of another user without password\n\nhttps://github.com/foxlox/GIUDA\n\nCVE-2023-42442\n\nhttps://github.com/HolyGu/CVE-2023-42442\n\nBypass the Event Trace Windows(ETW) and unhook ntdll.\n\nhttps://github.com/unkvolism/Fuck-Etw\n\nMicrosoft SharePoint Server Elevation of Privilege Vulnerability\n\nhttps://github.com/Chocapikk/CVE-2023-29357\n\nDorks-collections-list/onion.txt at main \u00b7 cipher387/Dorks-collections-list\n\nhttps://github.com/cipher387/Dorks-collections-list/blob/main/onion.txt\n\n#infosec #cybersecurity #hackersfactory\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-10-10T20:32:25.000000Z"}, {"uuid": "fa207b2b-3a53-4066-b915-46604281a75b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7317", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1a\u6f0f\u6d1e\u5229\u7528\n\u63cf\u8ff0\uff1aJumpServer \u5821\u5792\u673a\u672a\u6388\u6743\u7efc\u5408\u6f0f\u6d1e\u5229\u7528, Exploit for CVE-2023-42442 / CVE-2023-42820 / RCE 2021\nURL\uff1ahttps://github.com/tarihub/blackjump\n\n\u6807\u7b7e\uff1a#\u6f0f\u6d1e\u5229\u7528", "creation_timestamp": "2024-05-16T07:44:30.000000Z"}, {"uuid": "5f70ef10-3465-4562-88db-f1f98cfe0b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/185", "content": "\u2604\ufe0fCVE-2023-42820 PoC\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442:\nhttps://github.com/C1ph3rX13/CVE-2023-42820?ysclid=lnnn3ng83n191662763\n\n#cve #exploit #poc", "creation_timestamp": "2023-10-13T13:57:53.000000Z"}, {"uuid": "815f501f-1234-47a0-8b1e-4994d00ac276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5340", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-42820 POC\nURL\uff1ahttps://github.com/C1ph3rX13/CVE-2023-42820\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-10T06:35:48.000000Z"}, {"uuid": "b460abba-4664-4366-b922-74cd5b8c258b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "Telegram/1-Kew2TOnj1VV2g37F2glQT_zETjrruBgQw6WCuo7hVMTg", "content": "", "creation_timestamp": "2023-10-15T16:16:59.000000Z"}, {"uuid": "791174a9-f965-4dde-8fd1-d9026fb75087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9902", "content": "#exploit\n1. CVE-2023-42820,\nCVE-2023-42820,\nCVE-2023-42819:\nJumpserver Preauth RCE Exploit Chain\nhttps://sites.google.com/site/zhiniangpeng/blogs/Jumpserver\n\n2. CVE-2024-20931:\nA new attack surface for JNDI injection\nhttps://github.com/GlassyAmadeus/CVE-2024-20931\n\n3. CVE-2024-22899 - 22903:\nExploit Chain for Multiple Vulnerabilities in VinChin Backup &amp; Recovery\nhttps://github.com/Chocapikk/CVE-2024-22899-to-22903-ExploitChain", "creation_timestamp": "2024-02-07T20:22:24.000000Z"}, {"uuid": "4744f87e-7b00-4bd2-b8eb-b9db2aeeb48c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1767", "content": "", "creation_timestamp": "2023-10-12T19:26:49.000000Z"}, {"uuid": "8a1aec15-78f5-4acc-a4e5-9dd2f1ec25c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1766", "content": "CVE-2023-42820\n\u0414\u044b\u0440\u043a\u0430 \u0432 JumpServer (opensource \u0445\u043e\u0441\u0442-\u0431\u0430\u0441\u0442\u0438\u043e\u043d) \n\nUsage:\npython CVE-2023-42820.py -t http://IP:Port -e email -u username", "creation_timestamp": "2023-10-13T00:30:38.000000Z"}, {"uuid": "706cadaa-65b8-475c-9294-9adc9e47e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/jokerplstaeen/21208", "content": "CVE-2023-42820\n\nJumpServer - Random seed leakage results in the user password being reset\n\nhttps://github.com/h4m5t/CVE-2023-42820\n\n#cve #cybersecurity #infosec", "creation_timestamp": "2023-09-29T16:54:00.000000Z"}, {"uuid": "8e38071f-2967-4913-8579-b8652578f636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4463", "content": "https://system32.ink/jumpserver-cve-2023-42820-exploit/", "creation_timestamp": "2023-10-15T16:16:05.000000Z"}, {"uuid": "905d0b2b-83bd-4545-91f7-eb005d79b252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2706", "content": "#exploit\n1. CVE-2023-42820,\nCVE-2023-42820,\nCVE-2023-42819:\nJumpserver Preauth RCE Exploit Chain\nhttps://sites.google.com/site/zhiniangpeng/blogs/Jumpserver\n\n2. CVE-2024-20931:\nA new attack surface for JNDI injection\nhttps://github.com/GlassyAmadeus/CVE-2024-20931\n\n3. CVE-2024-22899 - 22903:\nExploit Chain for Multiple Vulnerabilities in VinChin Backup &amp; Recovery\nhttps://github.com/Chocapikk/CVE-2024-22899-to-22903-ExploitChain", "creation_timestamp": "2024-08-16T09:13:13.000000Z"}, {"uuid": "ae70e0cd-6e35-41e2-888f-6e7065870494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42820", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1153", "content": "#exploit\n1. CVE-2023-42442:\nJumpServer unauthorized access vulnerability\nhttps://github.com/HolyGu/CVE-2023-42442\n\n2. CVE-2023-43770:\nRoundcube allows XSS via text/plain e-mail messages\nhttps://github.com/s3cb0y/CVE-2023-43770-POC\n\n3. CVE-2023-42820:\nJumpServer - Random seed leakage results in the user password being reset\nhttps://github.com/h4m5t/CVE-2023-42820", "creation_timestamp": "2024-08-16T08:30:20.000000Z"}]}