{"vulnerability": "CVE-2023-4624", "sightings": [{"uuid": "12390ce2-855c-4855-a664-e14c30f2a28d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46241", "type": "seen", "source": "Telegram/nEXfu7nVFF0wvcs_j87oSUAjqm-fASFKqZ_lN_sbB2zLigsn", "content": "", "creation_timestamp": "2025-02-06T02:44:21.000000Z"}, {"uuid": "9beb3d59-7de2-4674-a056-7c0e472fe132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46249", "type": "seen", "source": "https://t.me/cibsecurity/73261", "content": "\u203c CVE-2023-46249 \u203c\n\nauthentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T19:22:31.000000Z"}, {"uuid": "589a7cf4-b6b3-481e-98ce-f995422a0844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46245", "type": "seen", "source": "https://t.me/cibsecurity/73257", "content": "\u203c CVE-2023-46245 \u203c\n\nKimai is a web-based multi-user time-tracking application. Versions 2.1.0 and prior are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. As of time of publication, no patches or known workarounds are available.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T19:22:25.000000Z"}, {"uuid": "1d9354c5-f5a8-4ce5-8d2e-5891df268e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46240", "type": "seen", "source": "https://t.me/cibsecurity/73253", "content": "\u203c CVE-2023-46240 \u203c\n\nCodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T19:22:20.000000Z"}, {"uuid": "d7ce8d9a-a699-4980-b09d-732b78a7449b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46248", "type": "seen", "source": "https://t.me/cibsecurity/73252", "content": "\u203c CVE-2023-46248 \u203c\n\nCody is an artificial intelligence (AI) coding assistant. The Cody AI VSCode extension versions 0.10.0 through 0.14.0 are vulnerable to Remote Code Execution under certain conditions. An attacker in control of a malicious repository could modify the Cody configuration file `.vscode/cody.json` and overwrite Cody commands. If a user with the extension installed opens this malicious repository and runs a Cody command such as /explain or /doc, this could allow arbitrary code execution on the user's machine. The vulnerability is rated as critical severity, but with low exploitability. It requires the user to have a malicious repository loaded and execute the overwritten command in VS Code. The issue is exploitable regardless of the user blocking code execution on a repository through VS Code Workspace Trust. The issue was found during a regular 3rd party penetration test. The maintainers of Cody do not have evidence of open source repositories having malicious `.vscode/cody.json` files to exploit this vulnerability. The issue is fixed in version 0.14.1 of the Cody VSCode extension. In case users can't promptly upgrade, they should not open any untrusted repositories with the Cody extension loaded.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T19:22:17.000000Z"}, {"uuid": "d8ba94a3-a17b-4606-ba2a-7fe7e45e003d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46241", "type": "seen", "source": "https://t.me/ctinow/189792", "content": "https://ift.tt/9zQP5To\nCVE-2023-46241", "creation_timestamp": "2024-02-21T17:22:04.000000Z"}, {"uuid": "25837ec4-1b22-4522-8dba-6dc98c5dd27b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46246", "type": "seen", "source": "https://t.me/cibsecurity/73070", "content": "\u203c CVE-2023-46246 \u203c\n\nVim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-27T22:17:17.000000Z"}, {"uuid": "deaaf6f3-de0e-4fd2-9409-d171b3ed18bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4624", "type": "seen", "source": "https://t.me/cibsecurity/69418", "content": "\u203c CVE-2023-4624 \u203c\n\nServer-Side Request Forgery (SSRF) in GitHub repository bookstackapp/bookstack prior to v23.08.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T16:12:13.000000Z"}, {"uuid": "a7ed4d84-07d1-4b40-97b3-68c93b6040d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46247", "type": "seen", "source": "https://t.me/ctinow/165697", "content": "https://ift.tt/l0wHd82\nCVE-2023-46247 | vyper up to 0.3.7 Storage Layout unknown vulnerability", "creation_timestamp": "2024-01-10T10:41:23.000000Z"}, {"uuid": "75ae151f-a8fc-4f7e-877a-dd09a22465a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46241", "type": "seen", "source": "https://t.me/ctinow/189806", "content": "https://ift.tt/9zQP5To\nCVE-2023-46241", "creation_timestamp": "2024-02-21T17:31:25.000000Z"}]}