{"vulnerability": "CVE-2023-4672", "sightings": [{"uuid": "8e2ab248-adac-4c17-848b-d028ca800aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46724", "type": "seen", "source": "https://t.me/arpsyndicate/588", "content": "#ExploitObserverAlert\n\nCVE-2023-46724\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-46724. Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.\n\nFIRST-EPSS: 0.003740000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-26T06:54:24.000000Z"}, {"uuid": "05a78cff-b3bc-4cd2-b963-0736a27e86d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46724", "type": "seen", "source": "https://t.me/arpsyndicate/4660", "content": "#ExploitObserverAlert\n\nCVE-2023-46724\n\nDESCRIPTION: Exploit Observer has 18 entries in 4 file formats related to CVE-2023-46724. Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.\n\nFIRST-EPSS: 0.006100000\nNVD-IS: 3.6\nNVD-ES: 3.9\nARPS-EXPLOITABILITY: 0.7187882", "creation_timestamp": "2024-04-13T13:22:58.000000Z"}, {"uuid": "be27af8c-b813-49c1-80ca-efdb09e0224c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46720", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46720\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X)\n\ud83d\udd39 Description: A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.\n\ud83d\udccf Published: 2024-06-11T14:32:00.582Z\n\ud83d\udccf Modified: 2025-05-01T03:55:28.503Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-23-356", "creation_timestamp": "2025-05-01T04:14:48.000000Z"}, {"uuid": "450482d5-d44a-4b7a-95d3-bc51b8df24f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46728", "type": "seen", "source": "https://t.me/cibsecurity/73626", "content": "\u203c CVE-2023-46728 \u203c\n\nSquid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T20:26:08.000000Z"}, {"uuid": "1a29221b-a12f-4700-a684-da515780bd51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46725", "type": "seen", "source": "https://t.me/cibsecurity/73453", "content": "\u203c CVE-2023-46725 \u203c\n\nFoodCoopShop is open source software for food coops and local shops. Versions prior to 3.6.1 are vulnerable to server-side request forgery. In the Network module, a manufacturer account can use the `/api/updateProducts.json` endpoint to make the server send a request to an arbitrary host. This means that the server can be used as a proxy into the internal network where the server is. Furthermore, the checks on a valid image are not adequate, leading to a time of check time of use issue. For example, by using a custom server that returns 200 on HEAD requests, then return a valid image on first GET request and then a 302 redirect to final target on second GET request, the server will copy whatever file is at the redirect destination, making this a full SSRF. Version 3.6.1 fixes this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-02T17:23:00.000000Z"}, {"uuid": "4065f549-b038-4b66-bbe5-f2a19569bda0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46724", "type": "seen", "source": "https://t.me/cibsecurity/73387", "content": "\u203c CVE-2023-46724 \u203c\n\nSquid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-01T23:22:01.000000Z"}, {"uuid": "2865e3b5-96fb-4f62-b96d-14e94edbfa0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46722", "type": "seen", "source": "https://t.me/cibsecurity/73262", "content": "\u203c CVE-2023-46722 \u203c\n\nThe Pimcore Admin Classic Bundle provides a backend UI for Pimcore. Prior to version 1.2.0, a cross-site scripting vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 1.2.0 to receive a patch or, as a workaround, apply the patch manually.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T19:22:32.000000Z"}, {"uuid": "5851fe21-457d-4d92-8841-fe9c58e5e560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46723", "type": "seen", "source": "https://t.me/cibsecurity/73254", "content": "\u203c CVE-2023-46723 \u203c\n\nlte-pic32-writer is a writer for PIC32 devices. In versions 0.0.1 and prior, those who use `sendto.txt` are vulnerable to attackers who known the IMEI reading the sendto.txt. The sendto.txt file can contain the SNS(such as slack and zulip) URL and API key. As of time of publication, a patch is not yet available. As workarounds, avoid using `sendto.txt` or use `.htaccess` to block access to `sendto.txt`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T19:22:21.000000Z"}, {"uuid": "5b337dcb-1205-46cc-9768-181abc3df823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46729", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1741", "content": "#exploit\n1. CVE-2023-6063:\nWP Fastest Cache &lt;1.2.2 - UnAuth SQL Injection\nhttps://github.com/motikan2010/CVE-2023-6063-PoC\n\n2. Axer Exploit Framework\nhttps://github.com/0romos/Axer\n\n3. CVE-2023-46729:\nURL Rewrite Vulnerability in Sentry Next.js SDK\nhttps://blog.huli.tw/2023/11/13/en/sentry-nextjs-sdk-cve-2023-46729", "creation_timestamp": "2024-08-16T08:45:56.000000Z"}, {"uuid": "4077dd5b-341f-4b54-953d-cd76d12ae70c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46726", "type": "seen", "source": "https://t.me/ctinow/165703", "content": "https://ift.tt/PH8W75e\nCVE-2023-46726 | GLPI up to 10.0.11 LDAP Server Configuration injection (GHSA-qc92-gxc6-5f95)", "creation_timestamp": "2024-01-10T11:11:34.000000Z"}, {"uuid": "89e22eb7-85ca-4c4a-991c-d4759f3dfaa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46727", "type": "seen", "source": "https://t.me/ctinow/165748", "content": "https://ift.tt/GFM0eLE\nCVE-2023-46727 | GLPI up to 10.0.10 sql injection (GHSA-v799-2mp3-wgfr)", "creation_timestamp": "2024-01-10T12:41:31.000000Z"}, {"uuid": "0d4363b5-1c6d-4287-830d-3067ce0a5112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4672", "type": "seen", "source": "https://t.me/ctinow/159998", "content": "https://ift.tt/GSp7TJa\nCVE-2023-4672", "creation_timestamp": "2023-12-28T11:26:38.000000Z"}]}