{"vulnerability": "CVE-2023-44313", "sightings": [{"uuid": "6630cfc7-bbd0-43d5-a576-734339f89da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44313", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4339", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-44313\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) vulnerability in Apache ServiceComb Service-Center. Attackers can obtain sensitive server information through specially crafted requests.This issue affects Apache ServiceComb before 2.1.0 (included). Users are recommended to upgrade to version 2.2.0, which fixes the issue.\n\ud83d\udccf Published: 2024-01-31T09:30:18Z\n\ud83d\udccf Modified: 2025-02-13T19:32:39Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-44313\n2. https://github.com/apache/servicecomb-service-center\n3. https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r\n4. http://www.openwall.com/lists/oss-security/2024/01/31/4", "creation_timestamp": "2025-02-13T20:14:38.000000Z"}, {"uuid": "d5ba8e8a-a300-4ddb-8ffc-399f0285a89c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44313", "type": "seen", "source": "https://t.me/ctinow/190733", "content": "https://ift.tt/5jW8KLO\nCVE-2023-44313 | Apache ServiceComb Service-Center up to 2.1.0 server-side request forgery", "creation_timestamp": "2024-02-22T14:12:22.000000Z"}, {"uuid": "66450ac4-e0c3-4cab-8c75-08850c60ae0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44313", "type": "seen", "source": "Telegram/5viUor3PDSvPiqgNCr88mEj2y9oAxMu41yUy-oSPp0S00Q", "content": "", "creation_timestamp": "2024-02-04T02:49:41.000000Z"}, {"uuid": "97eeb086-e90e-463d-a879-558782fe1321", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44313", "type": "seen", "source": "https://t.me/ctinow/176627", "content": "https://ift.tt/fMB2zcr\nCVE-2023-44313", "creation_timestamp": "2024-01-31T10:21:40.000000Z"}, {"uuid": "2b138ed5-0058-4cb2-b72e-89995a3cdc9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44313", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9943", "content": "#exploit\n1. Docker Remote API Scanner and Exploit\nhttps://github.com/justakazh/DockerExploit\n\n2. PoC of BITB w/out the use of iframes\nhttps://github.com/waelmas/frameless-bitb\n\n3. CVE-2023-44313:\nApache ServiceComb &lt;2.1 - SSRF\nhttps://xz.aliyun.com/t/13548", "creation_timestamp": "2024-02-10T15:53:58.000000Z"}]}