{"vulnerability": "CVE-2023-4317", "sightings": [{"uuid": "c3d2bdba-a5bf-44f3-8ffe-804b83206781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "7a5822c4-068a-4cbc-80cc-8d3427c71cae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:56.000000Z"}, {"uuid": "36c2e254-ac71-4e9e-b5eb-f9c84e1fbb54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "c31e0cba-d296-4a6c-a75d-4fc362b122c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-20)", "content": "", "creation_timestamp": "2025-09-20T00:00:00.000000Z"}, {"uuid": "355dc90f-15c0-4ee8-b3d5-eeec5a1249cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-28)", "content": "", "creation_timestamp": "2025-08-28T00:00:00.000000Z"}, {"uuid": "ef6804c1-051e-4d60-8a22-4742d6c4f6b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:46.000000Z"}, {"uuid": "397213c8-60e6-4d6b-aa9c-e9a66595e5bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:04.000000Z"}, {"uuid": "bd166b9e-4633-452f-9125-5f97f677ae66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/crushftp_rce_cve_2023_43177.rb", "content": "", "creation_timestamp": "2024-04-12T19:40:38.000000Z"}, {"uuid": "d2b8b23c-d9f0-4b78-bd59-4b8f2b46b215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-05)", "content": "", "creation_timestamp": "2026-04-05T00:00:00.000000Z"}, {"uuid": "20d190ba-dc04-4857-b019-47eebf18b745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "published-proof-of-concept", "source": "https://t.me/cKure/12154", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CrushFTP - CVE-2023-43177 Unauthenticated Remote Code Execution.\n\nhttps://blog.projectdiscovery.io/crushftp-rce/", "creation_timestamp": "2023-12-28T06:52:35.000000Z"}, {"uuid": "f7c2a0a8-6055-4ab6-ad03-3c4b8ec036d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/404", "content": "Top Security News for 17/11/2023\n\nHow human-centric and self-healing security closes the great gap in cybersecurity\nhttps://malware.news/t/how-human-centric-and-self-healing-security-closes-the-great-gap-in-cybersecurity/75781#post_1 \n\nUkraine at D+670: GRU may be expanding its targeting.\nhttps://thecyberwire.com/stories/ba12ab1185774c91a3c9dea8d33d9db4/ukraine-at-d670 \n\nI analyzed Stack Overflow for leaks\nhttps://www.reddit.com/r/netsec/comments/17wqwgg/i_analyzed_stack_overflow_for_leaks/ \n\nCrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chain\nhttps://www.reddit.com/r/netsec/comments/17wokij/crushftp_cve202343177_unauthenticated_rootlevel/ \n\nISC Stormcast For Friday, November 17th, 2023 https://isc.sans.edu/podcastdetail/8750, (Fri, Nov 17th)\nhttps://isc.sans.edu/diary/rss/30410 \n\nJTAG 'Hacking' the Original Xbox in 2023\nhttps://www.reddit.com/r/lowlevel/comments/17wwyhk/jtag_hacking_the_original_xbox_in_2023/ \n\nZero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups\nhttps://thehackernews.com/2023/11/zero-day-flaw-in-zimbra-email-software.html \n\nExperts Uncover DarkCasino: New Emerging APT Threat Exploiting WinRAR Flaw\nhttps://thehackernews.com/2023/11/experts-uncover-darkcasino-new-emerging.html \n\nOngoing cyberattack against Denmark is country's largest ever\nhttps://malware.news/t/ongoing-cyberattack-against-denmark-is-countrys-largest-ever/75779#post_1 \n\nHow to Automate the Hardest Parts of Employee Offboarding\nhttps://thehackernews.com/2023/11/how-to-automate-hardest-parts-of.html \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2023-11-17T08:00:07.000000Z"}, {"uuid": "89fd098c-40c2-4ee3-92a6-cc1d4358308e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "published-proof-of-concept", "source": "Telegram/AabRG3JrqUVTpd9XwuDTHZAEcoUAfsCAwBphWxcrY_KdH90", "content": "", "creation_timestamp": "2023-12-12T11:20:59.000000Z"}, {"uuid": "ad2e537c-840d-44b0-9b78-d8f30df8894e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "https://t.me/arpsyndicate/4679", "content": "#ExploitObserverAlert\n\nCVE-2023-43177\n\nDESCRIPTION: Exploit Observer has 15 entries in 9 file formats related to CVE-2023-43177. CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.\n\nFIRST-EPSS: 0.960880000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-EXPLOITABILITY: 0.930722", "creation_timestamp": "2024-04-18T04:18:13.000000Z"}, {"uuid": "daa59d86-483d-4947-b221-42ccdd9d3f9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "https://t.me/arpsyndicate/4669", "content": "#ExploitObserverAlert\n\nCVE-2023-43177\n\nDESCRIPTION: Exploit Observer has 14 entries in 8 file formats related to CVE-2023-43177. CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.\n\nFIRST-EPSS: 0.960880000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-EXPLOITABILITY: 0.9115715", "creation_timestamp": "2024-04-14T00:59:30.000000Z"}, {"uuid": "f56465f0-7382-403b-87bf-59af42698af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "seen", "source": "https://t.me/arpsyndicate/2191", "content": "#ExploitObserverAlert\n\nCVE-2023-43177\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2023-43177. CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.\n\nFIRST-EPSS: 0.009730000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-28T04:38:18.000000Z"}, {"uuid": "f469b573-5aec-4e85-a3a0-2a24a182611e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43176", "type": "seen", "source": "https://t.me/cibsecurity/71526", "content": "\u203c CVE-2023-43176 \u203c\n\nA deserialization vulnerability in Afterlogic Aurora Files v9.7.3 allows attackers to execute arbitrary code via supplying a crafted .sabredav file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T00:21:28.000000Z"}, {"uuid": "d4a0eb46-3c19-447e-9b08-3fac53552dee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4317", "type": "seen", "source": "https://t.me/ctinow/157850", "content": "https://ift.tt/geZ0Xin\nCVE-2023-4317 | GitLab prior 16.4.3/16.5.3/16.6.1 Pipeline Schedule access control (Issue 42184)", "creation_timestamp": "2023-12-21T17:42:44.000000Z"}, {"uuid": "fcc8f8c8-53e4-420f-85ec-6ca3836abd3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8117", "content": "CrushFTP - CVE-2023-43177 Unauthenticated Remote Code Execution\n\nhttps://blog.projectdiscovery.io/crushftp-rce/", "creation_timestamp": "2023-12-12T09:30:14.000000Z"}, {"uuid": "d37b117e-d7ce-4b3f-a0b8-a999df609600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9413", "content": "#Threat_Research\n1. CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated RCE\nhttps://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered\n2. Analysis of Unauthenticated Command Execution Vulnerability in Cisco IOS XE WebUI\nhttps://paper.seebug.org/3073", "creation_timestamp": "2023-11-18T06:12:36.000000Z"}, {"uuid": "c1b65aba-8a88-4b8d-ad05-dc2469128aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43177", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1745", "content": "#Threat_Research\n1. CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated RCE\nhttps://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered\n2. Analysis of Unauthenticated Command Execution Vulnerability in Cisco IOS XE WebUI\nhttps://paper.seebug.org/3073", "creation_timestamp": "2024-08-16T08:46:02.000000Z"}]}