{"vulnerability": "CVE-2024-2311", "sightings": [{"uuid": "294a95c8-6d0c-4143-b555-c8d7560e913c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:23:30.373261Z"}, {"uuid": "b087b05c-d392-4391-b38c-f69e047ee0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "confirmed", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:23:33.450898Z"}, {"uuid": "9e3c26d6-46aa-4440-8450-2dcfdae90065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:23:35.506694Z"}, {"uuid": "b7e77c02-67bc-47e9-be60-0c346226e38c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-10-09T18:10:02.000000Z"}, {"uuid": "b56e0332-5622-403e-9983-a44bf1faf28c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/eb740424-b73f-401b-9b79-f1d5085e106d", "content": "", "creation_timestamp": "2024-02-19T20:40:01.000000Z"}, {"uuid": "2095f91e-a872-497a-9e21-a086c19a894a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113482323234195101", "content": "", "creation_timestamp": "2024-11-14T16:47:13.243398Z"}, {"uuid": "4cbadeab-5c04-4589-983b-f52d02f7a62d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/113483673211675864", "content": "", "creation_timestamp": "2024-11-14T22:30:43.910677Z"}, {"uuid": "d1e7496e-d6d2-44b1-b256-2be2b0994dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://chaos.social/users/HonkHase/statuses/113492318503579152", "content": "", "creation_timestamp": "2024-11-16T11:56:29.753500Z"}, {"uuid": "9859520d-ad02-49ca-aadf-6e61e69947ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/113627170010946952", "content": "", "creation_timestamp": "2024-12-10T06:43:39.589933Z"}, {"uuid": "8f31aa9b-c7d4-4f2e-89fb-0f4be726f3a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113828003758066396", "content": "", "creation_timestamp": "2025-01-14T17:58:19.568174Z"}, {"uuid": "1ad28dc6-57d5-4ed7-bde2-f975c875b66c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}, {"uuid": "678bbfe4-ca77-4ac7-a5c5-e0c1f23bebaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/2/kritische-sicherheitslucken-in-fortinet-fortios-updates-verfugbar", "content": "", "creation_timestamp": "2024-02-09T08:40:20.000000Z"}, {"uuid": "8721a2d3-de6c-4a7f-b4a1-a63a325aa561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3lnkzrwu5xs2b", "content": "", "creation_timestamp": "2025-04-24T15:33:21.504779Z"}, {"uuid": "2f59cfe8-8d81-4979-948f-83cc3f8bedea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv6dbvxfel2o", "content": "", "creation_timestamp": "2025-07-30T09:40:14.258921Z"}, {"uuid": "bc26dcc9-4143-47f8-9636-19da3b50e79b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1225", "content": "", "creation_timestamp": "2024-02-09T04:00:00.000000Z"}, {"uuid": "5e6b06a8-30de-4938-babb-7671d7e3627b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://vulnerability.circl.lu/comment/a1cef39c-8b09-4347-95bb-f4ffedfafccf", "content": "", "creation_timestamp": "2024-10-13T15:21:32.545076Z"}, {"uuid": "d63af7a0-43bb-4ec3-8d12-6a9defeffe0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}, {"uuid": "dbc43cfb-6c0e-4603-8f28-cb537eee4359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_8/2024", "content": "", "creation_timestamp": "2024-02-09T10:14:28.000000Z"}, {"uuid": "57967c91-5eb7-423d-9a97-c77d27b7c3ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "bffa1f1e-c6c4-43eb-83a6-359409c3cb5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8836", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113-Private-POC\nURL\uff1ahttps://github.com/groshi/CVE-2024-23113-Private-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-25T11:46:10.000000Z"}, {"uuid": "217a4b54-b9ce-40e2-9d80-66e5ffafa425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/78a4f3c7-077d-4afa-945e-9cc0d076a86d", "content": "", "creation_timestamp": "2026-02-02T12:26:26.614235Z"}, {"uuid": "b7bd0b5a-bed2-4e0c-9463-33b044b273b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8876", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 \u662f\u5b58\u5728\u4e8e\u67d0\u7279\u5b9a\u8f6f\u4ef6\u6216\u7cfb\u7edf\u4e2d\u7684\u4e00\u4e2a\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u6076\u610f\u653b\u51fb\u8005\u5728\u7279\u5b9a\u6761\u4ef6\u4e0b\u5229\u7528\u7cfb\u7edf\u4e2d\u7684\u7f3a\u9677\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u7684\u884c\u4e3a\u3002\u8fd9\u79cd\u884c\u4e3a\u53ef\u80fd\u5305\u62ec\u4f46\u4e0d\u9650\u4e8e\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3001\u8bbf\u95ee\u654f\u611f\u4fe1\u606f\u6216\u4ee5\u66f4\u9ad8\u6743\u9650\u6267\u884c\u64cd\u4f5c\u3002\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T08:23:08.000000Z"}, {"uuid": "933ee1e1-db27-4297-9976-6a396382261a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23111", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14225", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23111\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R)\n\ud83d\udd39 Description: An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests.\n\ud83d\udccf Published: 2024-06-11T14:32:00.312Z\n\ud83d\udccf Modified: 2025-05-01T03:55:29.141Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-23-471", "creation_timestamp": "2025-05-01T04:14:46.000000Z"}, {"uuid": "71938a5d-3c44-4a38-ac13-eea662e9a4cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8929", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC TO RCE\nURL\uff1ahttps://github.com/radoslavatanasov1/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-02T12:30:21.000000Z"}, {"uuid": "34dcbabe-ea4c-4639-ba73-d811ded18add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8869", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113-Private-POC\nURL\uff1ahttps://github.com/hatvix1/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-28T18:03:29.000000Z"}, {"uuid": "e075c69c-efdf-498f-b835-8c68b65c957e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6766", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 FortiOS SSL VPN RCE\nURL\uff1ahttps://github.com/tr1pl3ight/CVE-2024-23113-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-09T03:10:07.000000Z"}, {"uuid": "82c72680-b74b-40ad-9396-5adc6cea0516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23111", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8854", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aRepository for CVE-2024-23113\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23111\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-27T17:43:03.000000Z"}, {"uuid": "27f49891-5f59-4b48-abf8-713ca375f6cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8854", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aRepository for CVE-2024-23113\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23111\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-27T17:43:03.000000Z"}, {"uuid": "081184b5-ee10-4c6d-a0fe-42cf8c79129c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6773", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 Exploit with More than 20000 Targets\nURL\uff1ahttps://github.com/labesterOct/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-10T07:36:43.000000Z"}, {"uuid": "30829517-2cc5-4584-89a1-1f843847c41f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6772", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 FortiOS SSL VPN RCE\nURL\uff1ahttps://github.com/foxymoxxy/CVE-2024-23113-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2025-02-06T11:50:09.000000Z"}, {"uuid": "30c4cb52-69b8-48ae-b8c0-18a9ae9b8851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7352", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23115\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the updateGroups function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22295.\n\ud83d\udccf Published: 2024-04-01T21:47:10.063Z\n\ud83d\udccf Modified: 2025-03-12T16:44:02.354Z\n\ud83d\udd17 References:\n1. https://www.zerodayinitiative.com/advisories/ZDI-24-117/", "creation_timestamp": "2025-03-12T17:41:44.000000Z"}, {"uuid": "0682ac29-7209-4cd1-9203-ce6a7f5166ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 \u662f\u4e00\u4e2a\u5728 Linux Kernel \u4e2d\u88ab\u53d1\u73b0\u7684\u6f0f\u6d1e\uff0c\u5b83\u5c5e\u4e8e \u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u5f71\u54cd\u4e86 bpf (Berkeley Packet Filter) \u5b50\u7cfb\u7edf\u3002\u5177\u4f53\u6765\u8bf4\uff0c\u8fd9\u4e2a\u6f0f\u6d1e\u5f71\u54cd\u4e86 bpf \u7a0b\u5e8f\u7684 bpf_prog \u7c7b\u578b\u7684\u5bf9\u8c61\uff0c\u5e76\u4e14\u53ef\u4ee5\u5141\u8bb8\u653b\u51fb\u8005\u901a\u8fc7\u6784\u9020\u6076\u610f\u7684 BPF \u7a0b\u5e8f\u6765\u5728\u5185\u6838\u7a7a\u95f4\u6267\u884c\u6076\u610f\u4ee3\u7801\u3002\nURL\uff1ahttps://github.com/XiaomingX/CVE-2024-23113-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-28T06:34:11.000000Z"}, {"uuid": "99e097d7-7798-413e-9e1f-38bbb73315bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13750", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024.\n\nhttps://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/", "creation_timestamp": "2024-10-15T05:18:43.000000Z"}, {"uuid": "4787d309-92de-426e-826a-c23517770873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/655", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113-Private-POC\nURL\uff1ahttps://github.com/hatvix1/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T13:12:36.000000Z"}, {"uuid": "56bee9b5-32ed-4fe6-a226-ddd9e5d71377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/1445", "content": "\u26a0\ufe0f \u041f\u043e\u0447\u0442\u0438 \u0444\u043b\u044d\u0448-\u0440\u043e\u044f\u043b\u044c: \u043f\u0430\u0442\u0447\u0438\u043c Fortinet, Palo Alto \u0438 Ivanti\n\n\u0421\u043b\u043e\u0436\u043d\u0430\u044f \u043d\u0435\u0434\u0435\u043b\u044c\u043a\u0430 \u0434\u043b\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0430 \u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u2014 \u0434\u043b\u044f \u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432.\n\n\u0411\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c Palo Alto \u043f\u043e\u0441\u0432\u044f\u0449\u0451\u043d \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Palo Alto Networks Expedition, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 API-\u043a\u043b\u044e\u0447\u0438 \u043e\u0442 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 PAN-OS. \u0420\u0435\u0439\u0442\u0438\u043d\u0433 CVSS \u0434\u043b\u044f \u044d\u0442\u0438\u0445 CVE  \u0432\u0430\u0440\u044c\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043e\u0442 7 \u0434\u043e 9.9, \u043f\u043e\u0441\u043b\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u0441\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0441\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 API-\u043a\u043b\u044e\u0447\u0438. \u0421\u0430\u043c\u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b \u0434\u0435\u0444\u0435\u043a\u0442\u0430\u043c\u0438 \u043d\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b. \u0415\u0441\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0438 PoC, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0432\u0438\u0434\u0438\u043c\u043e, \u043d\u0435 \u0437\u0430 \u0433\u043e\u0440\u0430\u043c\u0438.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c CISA \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-23113, \u044d\u0442\u043e RCE \u0432 FortiOS \u0441 CVSS 9.8, \u0437\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 \u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u043d\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u0435. \u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b FortiOS, FortiPAM, FortiProxy \u0438 FortiWeb. \u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u043c \u0433\u043e\u0441\u043e\u0440\u0433\u0430\u043d\u0430\u043c \u0432\u0435\u043b\u0435\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0438\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0442\u0440\u0451\u0445 \u043d\u0435\u0434\u0435\u043b\u044c, \u0432\u0441\u0435\u043c \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u0442\u043e\u0436\u0435 \u0441\u0442\u043e\u0438\u0442 \u043f\u043e\u0442\u043e\u0440\u043e\u043f\u0438\u0442\u044c\u0441\u044f.\n\n\u041d\u0443 \u0430 Ivanti \u0441\u0442\u043e\u0439\u043a\u043e \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0438\u0434\u0442\u0438 \u043f\u0440\u0435\u0436\u043d\u0438\u043c \u043a\u0443\u0440\u0441\u043e\u043c, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0432 \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u0442\u0440\u0438 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u0441 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c, \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u043c \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435, \u0441\u043d\u043e\u0432\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \n\u0420\u0435\u0447\u044c \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438  \u0432  Ivanti Cloud Services Application  (CVE-2024-9379, -9380, -9388 \u043f\u043b\u044e\u0441 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f CVE-2024-8963), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434. \u0412\u0435\u043d\u0434\u043e\u0440 \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u043d\u0430 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 CSA 5.0 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u043e, \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 4.6.\n\u0420\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043e \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u0434\u0440\u0443\u0433\u0438\u0445 \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u2014 CVE-2024-7612 \u0432 Ivanti Endpoint Manager Mobile  (\u043d\u0435\u043f\u0440\u0430\u0432\u043e\u043c\u0435\u0440\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, CVSS 8.8) \u0438 CVE-2024-37404 \u0432 Ivanti Connect Secure / Policy Secure  (RCE, CVSS 9.1).\n\n\u0422\u0435, \u043a\u0442\u043e \u043d\u0435 \u0438\u043c\u043f\u043e\u0440\u0442\u043e\u0437\u0430\u043c\u0435\u0449\u0430\u0435\u0442\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u043c\u0438\u043d\u0443\u0442\u044b, \u0443\u0436\u0435 \u0431\u0435\u0433\u0443\u0442 \u0438\u0441\u043a\u0430\u0442\u044c \u0430\u043f\u0434\u0435\u0439\u0442\u044b.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-10-10T10:01:33.000000Z"}, {"uuid": "e7a52258-9583-4067-a248-130f004e51f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ViralCyber/6999", "content": "\ud83d\udd34 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u06cc\u0634 \u0627\u0632 \u0668\u0667\u0660\u0660\u0660 \u062f\u0633\u062a\u06af\u0627\u0647 FortiOS \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631\n\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062d\u06cc\u0627\u062a\u06cc \u06a9\u0647 \u0628\u06cc\u0634 \u0627\u0632 \u0668\u0667\u0660\u0660\u0660 \u062f\u0633\u062a\u06af\u0627\u0647 FortiOS \u0631\u0627 \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0634\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0627\u06cc\u0646 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0627\u062a \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u0627\u06cc\u0646 \u0646\u0642\u0635 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2024-23113\u060c \u0686\u0646\u062f\u06cc\u0646 \u0646\u0633\u062e\u0647 \u0627\u0632 FortiOS\u060c FortiProxy\u060c FortiPAM \u0648 FortiWeb \u0631\u0627 \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0632 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0633\u062a\u0631\u06cc\u0646\u06af \u0641\u0631\u0645\u062a \u06a9\u0646\u062a\u0631\u0644\u200c\u0634\u062f\u0647 \u062e\u0627\u0631\u062c\u06cc \u062f\u0631 FortiOS fgfmd daemon \u0646\u0627\u0634\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062a\u0627\u06cc\u06cc\u062f \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u06cc\u0627 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062f\u0631\u062e\u0648\u0627\u0633\u062a\u200c\u0647\u0627\u06cc \u0633\u0627\u062e\u062a\u0647\u200c\u0634\u062f\u0647 \u062e\u0627\u0635 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\n\u0637\u0628\u0642 \u0627\u0633\u06a9\u0646\u200c\u0647\u0627\u06cc Shadowserver\u060c \u062a\u0642\u0631\u06cc\u0628\u0627 87390 \u0622\u062f\u0631\u0633 IP \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0628\u0627\u0644\u0642\u0648\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 Fortinet \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f. \u0627\u06cc\u0627\u0644\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0628\u0627 14000 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u062f\u06cc\u062f\u0647 \u067e\u06cc\u0634\u062a\u0627\u0632 \u0627\u0633\u062a \u0648 \u067e\u0633 \u0627\u0632 \u0622\u0646 \u0698\u0627\u067e\u0646 (5100) \u0648 \u0647\u0646\u062f (4800) \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f\u061b \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u06cc\u0631\u0627\u0646 \u0646\u06cc\u0632 \u0627\u0632 \u0627\u06cc\u0646 \u0642\u0627\u0639\u062f\u0647 \u0645\u0633\u062a\u062b\u0646\u06cc \u0646\u06cc\u0633\u062a.\n\n#Cybersecurity #Cyber_Attack #FortiOS #RCE #Fortinet #FortiPAM #FortiProxy #FortiWeb #fgfmd #FortiManager #FortiGate #\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u062d\u0645\u0644\u0647_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0641\u0648\u0631\u062a\u06cc\u0646\u062a #\u0641\u0648\u0631\u062a\u06cc\u06af\u06cc\u062a\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @Takianco\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2024-10-15T14:25:38.000000Z"}, {"uuid": "de2b5b2c-0043-4e76-97f4-74835f8d6247", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/658", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 \u662f\u5b58\u5728\u4e8e\u67d0\u7279\u5b9a\u8f6f\u4ef6\u6216\u7cfb\u7edf\u4e2d\u7684\u4e00\u4e2a\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u6076\u610f\u653b\u51fb\u8005\u5728\u7279\u5b9a\u6761\u4ef6\u4e0b\u5229\u7528\u7cfb\u7edf\u4e2d\u7684\u7f3a\u9677\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u7684\u884c\u4e3a\u3002\u8fd9\u79cd\u884c\u4e3a\u53ef\u80fd\u5305\u62ec\u4f46\u4e0d\u9650\u4e8e\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3001\u8bbf\u95ee\u654f\u611f\u4fe1\u606f\u6216\u4ee5\u66f4\u9ad8\u6743\u9650\u6267\u884c\u64cd\u4f5c\u3002\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T13:12:36.000000Z"}, {"uuid": "74c0009c-0595-4062-97e2-ffa85d9a0202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/128621", "content": "", "creation_timestamp": "2024-10-12T22:23:27.000000Z"}, {"uuid": "48c98590-0fd8-4826-96b2-7dc22f3b367d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/MsaLXAecATEeSP3bIP2xsXsVfQMtECSF46FI3pHxvqNNPfiP", "content": "", "creation_timestamp": "2025-01-14T14:02:51.000000Z"}, {"uuid": "4165cf6a-20a3-4eb4-a54b-d14c5a4b5c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/891", "content": "CVE-2024-23113 Checker.", "creation_timestamp": "2024-10-10T17:52:35.000000Z"}, {"uuid": "38615774-8113-4a9f-80c0-5e3c68611b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/890", "content": "Just a light PoC \ud83d\ude02", "creation_timestamp": "2024-10-10T17:13:13.000000Z"}, {"uuid": "bef1faa9-0ca2-4048-a91a-d0993615db7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/Hunt3rkill3rs1/889", "content": "CVE-2024-23113 Exploited Successfully \ud83d\ude0e\n\nWait for us, Fortinet \ud83d\ude02", "creation_timestamp": "2024-10-10T16:57:11.000000Z"}, {"uuid": "c5f93779-b002-42b8-9211-3a9ac0a4aa3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/128622", "content": "CHANNELS\n\nTOX ID SUPPORT 022A7EEB83B648F55DA7A6BEFD130C2156C74F3501A31D853234EC2D18E77A1EA9FCE8BF45DE\n\n( RansomHub \u0440\u0435\u0431\u0440\u0435\u043d\u0434\u0438\u043d\u0433 BlackCat, \u0431\u0443\u0434\u044c\u0442\u0435 \u0430\u043a\u043a\u0443\u0440\u0430\u0442\u043d\u044b )\n@LockBitSuppRaas", "creation_timestamp": "2024-10-12T22:23:27.000000Z"}, {"uuid": "494e27b0-3991-4946-8f47-7a5d65591a85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/1_TySFnc1nz-kcXeJCXQZDYM9oo_28cD1m1Zwhw9cHHvjQY5", "content": "", "creation_timestamp": "2025-01-20T01:06:13.000000Z"}, {"uuid": "253678bc-039c-43dd-842e-c4e370b4cdc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/CEK7-PKupQfdk0SjOSRczbh1FS6zKSGNseKEfnfBgojb2z8x", "content": "", "creation_timestamp": "2025-03-03T15:22:22.000000Z"}, {"uuid": "e2846fb5-e4f5-4326-8fe4-7012400c049a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/DmehSKpdGyx3yTe3ZT_j9yARFkHsuQzPWdJDNDr7SkL5Qd9Y", "content": "", "creation_timestamp": "2025-03-02T08:20:14.000000Z"}, {"uuid": "e05e36f0-6cc0-4287-82c5-64b955988388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/PG_WTmVtWU2POU_mhGwfN-V1phN9BSx-4YqzhAmMM69fo7D2", "content": "", "creation_timestamp": "2025-02-27T21:23:23.000000Z"}, {"uuid": "1f33fd18-1fda-40c1-abe8-238e17727d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/strKQnl6XITRRSJno38w6TopaImkE6v18oYI4dnhGsWQRhrR", "content": "", "creation_timestamp": "2024-12-25T21:02:03.000000Z"}, {"uuid": "e1eca85d-5f71-4995-8f2b-d3459463c815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/QWlJobXWfZyefK779rL_JmZz7Vbm02kPR6Jk9dMHhvyTp3mG", "content": "", "creation_timestamp": "2024-11-24T09:45:28.000000Z"}, {"uuid": "79bcb458-24c1-46a6-9671-d2e6c24e80e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/d-bvCqKcgFEK__e1hOIxuXXmid2CuRo8nmLJtashTV_kTDVK", "content": "", "creation_timestamp": "2024-11-16T08:16:36.000000Z"}, {"uuid": "f8860eb2-d76c-47f2-96eb-78eb33b6a69b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/0WvBhCAXP1ofpgyT2ySJENQAj3jhM2_RMfmkhEqVoc2EOvLF", "content": "", "creation_timestamp": "2024-11-19T05:51:49.000000Z"}, {"uuid": "15f05532-ee76-4d26-a46d-39aa32165a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/ymlgOxuPXK6Ae_Lir6rqoySFS2RSA-yyzl1nwgdgzflMk5ZT", "content": "", "creation_timestamp": "2024-11-11T21:39:49.000000Z"}, {"uuid": "a3197f91-3dfc-4b74-b0b3-2b98b79e4387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23115", "type": "seen", "source": "https://t.me/arpsyndicate/3351", "content": "#ExploitObserverAlert\n\nZDI-24-117\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-117. Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23115.", "creation_timestamp": "2024-02-11T12:00:06.000000Z"}, {"uuid": "3ef9225b-5160-401e-9512-ed381d6c7ef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/CS_KJ9CgkmiE6Ezf_V2vBiiuIi46OvR-W3l8Gty02i2PkbML", "content": "", "creation_timestamp": "2024-10-25T07:12:44.000000Z"}, {"uuid": "98938400-3bf9-4696-8a33-7bd138c0155b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/yo5eq1la3P-tfdwuZuJ4Sb6--BBixJnry-u_KBoUaeFoeVCS", "content": "", "creation_timestamp": "2024-10-25T07:12:44.000000Z"}, {"uuid": "4618f69d-b58f-4627-b74b-b5d8b21c9a57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/bAwQIpDT0bIzvIb69Z4mTwL4-Rbfx0GWjT4-wyQ_7IFr1Cc", "content": "", "creation_timestamp": "2024-10-12T22:23:18.000000Z"}, {"uuid": "107ed06b-eef0-4130-b35b-6d7147aa8139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/23296", "content": "The Hacker News\nCISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nThe vulnerability, tracked as CVE-2024-23113 (CVSS score: 9.8), relates to cases of remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb.\n\"A", "creation_timestamp": "2024-10-10T10:23:58.000000Z"}, {"uuid": "8fbcdd16-475f-44c0-b256-96693350f9c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23112", "type": "seen", "source": "https://t.me/arpsyndicate/4197", "content": "#ExploitObserverAlert\n\nCVE-2024-23112\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23112. An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user\u2019s bookmark via URL manipulation.", "creation_timestamp": "2024-03-13T22:29:40.000000Z"}, {"uuid": "52e30bce-d10a-4c3d-b71f-4d3d704871c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23119", "type": "seen", "source": "https://t.me/arpsyndicate/3435", "content": "#ExploitObserverAlert\n\nZDI-24-113\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-113. Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-23119.", "creation_timestamp": "2024-02-11T16:07:26.000000Z"}, {"uuid": "ce37c4f0-e992-4d1a-afbe-9c23be525971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23117", "type": "seen", "source": "https://t.me/arpsyndicate/3434", "content": "#ExploitObserverAlert\n\nZDI-24-115\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-115. Centreon updateContactServiceCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23117.", "creation_timestamp": "2024-02-11T16:03:53.000000Z"}, {"uuid": "a8f42d26-fffe-4f3c-a74a-e9c7fb8ebb31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23118", "type": "seen", "source": "https://t.me/arpsyndicate/3420", "content": "#ExploitObserverAlert\n\nZDI-24-114\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-114. Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23118.", "creation_timestamp": "2024-02-11T15:16:15.000000Z"}, {"uuid": "ddcffce7-53c0-4e17-9030-99e93720b492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23116", "type": "seen", "source": "https://t.me/arpsyndicate/3378", "content": "#ExploitObserverAlert\n\nZDI-24-116\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-116. Centreon updateLCARelation SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23116.", "creation_timestamp": "2024-02-11T13:06:36.000000Z"}, {"uuid": "7e3027b5-a534-4b98-9f6f-3bdeb5ca1f47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "Telegram/v7Diel1jEKhhIQanhK2Lz8w_QvkEpcY2Z2GOuR8bSip4ZA", "content": "", "creation_timestamp": "2024-10-10T11:20:41.000000Z"}, {"uuid": "b6630db4-5141-4f56-9985-d50b01ac26e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23114", "type": "seen", "source": "https://t.me/arpsyndicate/3845", "content": "#ExploitObserverAlert\n\nCVE-2024-23114\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23114. Deserialization of Untrusted Data vulnerability in Apache Camel CassandraQL Component AggregationRepository which is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.  Users are recommended to upgrade to version 4.4.0, which fixes the issue.\u00a0If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1", "creation_timestamp": "2024-02-21T15:28:04.000000Z"}, {"uuid": "4908e29c-316a-4f8f-ad97-f696302d117f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/AQEFDRwlxFAKZwBPrmFhdI9-mmuZNVQ9kpN4lp54hjzDQ1sZ", "content": "", "creation_timestamp": "2024-10-25T07:12:41.000000Z"}, {"uuid": "f752cab1-cc06-4671-9eeb-ec3f141ed781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/L_b1Xuj0our3a1ZqxBxYLK2myBV1m-ORB7vprZDz005sTRsB", "content": "", "creation_timestamp": "2025-01-20T01:06:09.000000Z"}, {"uuid": "20ff0b6d-72f9-47d9-9a3a-08df0a331592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/wYoe5N3CsqjMr2_CPLw5Bvozx9eXplKs_1JUyUp4h8xYD_g", "content": "", "creation_timestamp": "2024-10-12T22:23:20.000000Z"}, {"uuid": "0ffd86b2-c962-4525-b4d1-ac0e67e94bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/CBNZrzqmsjfc3IPp7zmwl-B_LMxMooaPbYTpYe43Wmzk_UlF", "content": "", "creation_timestamp": "2024-11-19T05:51:45.000000Z"}, {"uuid": "127c3dee-7105-42de-920a-1a67620dad80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/Mw6Mxm_XYAVD7IjT0FEYcfQgtTghvSGuRY6JkQbxc6gxKlVe", "content": "", "creation_timestamp": "2024-10-25T07:12:41.000000Z"}, {"uuid": "4fd1aee4-9293-4513-82b8-b34b76504b50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/KfOc1AWAD39Ayerk8PX3DJaIsvVBQJIafEdvj54B-M0vn2U", "content": "", "creation_timestamp": "2024-10-12T22:23:20.000000Z"}, {"uuid": "1bfde437-6731-4fa7-bd11-e0993ee7959a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/Qz3QPsOOVdbSJ9FWpVd5WT3ielUxuX3CJ_uub9Md563O0SgP", "content": "", "creation_timestamp": "2024-11-16T08:16:32.000000Z"}, {"uuid": "f215e85f-c363-496a-bfdb-34785a5ca0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/mw8SQLlN6PeMEGHS7GHyyNpaadIhKbuXFGHUFbEBJG5g3LPh", "content": "", "creation_timestamp": "2024-11-24T09:45:22.000000Z"}, {"uuid": "a772c47a-e5fe-4933-9cf5-7c5065830a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/vPGTpHMQaW-6QkByQ5ygtq8yqxGHUszBdLBP8jw2yhggb3Va", "content": "", "creation_timestamp": "2024-11-11T21:39:45.000000Z"}, {"uuid": "895e0fb8-1b94-4cba-aa56-cf7371054eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/10473", "content": "Fortimanager Unauthenticated Remote Code Execution AKA fortijump CVE-2024-47575\n\nPOC for CVSS 9.8 vulnerability in FortiManager, their tool for central management of FortiGate appliances.\n\nBlog: https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n#1N73LL1G3NC3 #fortinet\n\n@freedomf0x", "creation_timestamp": "2024-11-15T03:55:46.000000Z"}, {"uuid": "ca4f2a17-3499-4568-82f5-ff7eea74da19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/h6CzIWajF5rNNAOpz3X6tJZnaIiHX6SZWvRwLtrSQmMmi6-R", "content": "", "creation_timestamp": "2025-01-14T14:02:47.000000Z"}, {"uuid": "350398d3-2f57-4a19-a964-3ffd5aff10fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/mTqXEyv8Pb9UCO1k_ZxjjXiRfrtbSnVJOLBPrCmi4wAHrv-r", "content": "", "creation_timestamp": "2025-03-03T15:22:23.000000Z"}, {"uuid": "60069502-ca05-4f61-8a57-e20ea9982f2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/ux4Zr-z4ECFI7xa5pBI5DnDKzfYX8Fq0hXoGAd6c_e_1sH1Z", "content": "", "creation_timestamp": "2025-03-02T08:20:10.000000Z"}, {"uuid": "94721301-0de5-4dec-b034-aa52dc13a482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/npUGSI6L8vlLkQsbOryfU4Uio-VBoFGPgEg04rTg4t4yNW9i", "content": "", "creation_timestamp": "2025-02-27T21:23:25.000000Z"}, {"uuid": "2bbd09c1-7545-49a1-a907-70ff2e46aa39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/Bw4k0sSuQKGk-LMUlz8E8QcYJV2MftkDjkwJUO0f-MtoZUgp", "content": "", "creation_timestamp": "2024-12-25T21:01:59.000000Z"}, {"uuid": "41d4daec-3888-4a70-9493-5748376e6721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/10156", "content": "Fortimanager Unauthenticated Remote Code Execution AKA fortijump CVE-2024-47575\n\nPOC for CVSS 9.8 vulnerability in FortiManager, their tool for central management of FortiGate appliances.\n\nBlog: https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n#1N73LL1G3NC3 #fortinet\n\n@freedomf0x", "creation_timestamp": "2024-11-15T03:55:46.000000Z"}, {"uuid": "5fb32496-06a5-4add-b742-0f2034b35067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5064", "content": "The Hacker News\nCISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nThe vulnerability, tracked as CVE-2024-23113 (CVSS score: 9.8), relates to cases of remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb.\n\"A", "creation_timestamp": "2024-10-10T10:23:58.000000Z"}, {"uuid": "92f6a144-73c6-452e-bf64-e297b517a285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/cybersecs/3322", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\n\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol, circumventing authentication. Referred to as FortiJump, this vulnerability provides unauthorized access to FortiManager, enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes. \n\n\ud83d\udee0 Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\n\n\ud83d\udd17 Research: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n\ud83d\udd17 Source: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#fortinet #fortimanager #fgfm #unauth #rce", "creation_timestamp": "2024-11-28T18:35:25.000000Z"}, {"uuid": "91ffcb4f-8406-4850-aa3a-1e5340045c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6304", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043e \u0433\u0440\u0443\u0441\u0442\u043d\u043e\u043c, \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Fortinet RCE \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0420\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e CVE-2024-23113, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0434\u0435\u043c\u043e\u043d fgfmd \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u0430 \u0441\u0442\u0440\u043e\u043a\u0443 \u0444\u043e\u0440\u043c\u0430\u0442\u0430, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u0443\u044e \u0438\u0437\u0432\u043d\u0435, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438\u043b\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u043d\u0435\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u044f\u0435\u0442 Fortinet, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0434\u0435\u043c\u043e\u043d fgfmd \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 FortiGate \u0438 FortiManager, \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044f \u0432\u0441\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043c\u0435\u0436\u0434\u0443 \u043d\u0438\u043c\u0438.\n\nCVE-2024-23113\u00a0\u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 FortiOS 7.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, FortiPAM 1.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, FortiProxy 7.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 FortiWeb 7.4.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0435\u0449\u0435 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u043f\u043e\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u0432 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0435\u043c\u043e\u043d\u0443 fgfmd \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u043e\u0432 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439, \u043f\u0440\u0438\u0437\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c Fortinet \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u043d\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0441\u0432\u043e\u0438 \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0447\u0430\u0441\u0442\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-23113, \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0441\u0432\u043e\u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0432 \u043d\u0435\u0432\u0435\u0434\u0435\u043d\u0438\u0438.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 Palo Alto Networks, \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u044b \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b PAN-OS. \u0421\u0440\u0435\u0434\u0438 \u043d\u0438\u0445:\n\n- CVE-2024-9463\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434)\n- CVE-2024-9464\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434)\n- CVE-2024-9465\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438)\n- CVE-2024-9466\u00a0(\u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435 \u0432 \u0436\u0443\u0440\u043d\u0430\u043b\u0430\u0445)\n- CVE-2024-9467\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c XSS \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438)\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u0438 Expedition. \u0418\u0445 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c (\u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438, \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u043a\u043b\u044e\u0447\u0438 API \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432 PAN-OS), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u0443\u0442\u0435\u0447\u043a\u0438.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Horizon3.ai, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u0432\u0448\u0438\u0435 \u043e \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u043e\u0448\u0438\u0431\u043a\u0430\u0445, \u0443\u0436\u0435 \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442, \u0430 Hanley - PoC, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u044e\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0431\u0440\u043e\u0441\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 CVE-2024-5910 \u0441 CVE-2024-9464 \u0434\u043b\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 Expedition.\n\n\u0412 Palo Alto Networks \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043d\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0434\u043b\u044f \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a. \u041d\u043e \u044d\u0442\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u043a\u0430.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Expedition \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0441\u0435 \u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u043a\u043b\u044e\u0447\u0438 API, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0434\u043b\u044f \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430.\n\n\u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438 Expedition \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0445\u043e\u0441\u0442\u043e\u0432 \u0438\u043b\u0438 \u0441\u0435\u0442\u0435\u0439.", "creation_timestamp": "2024-10-10T13:17:11.000000Z"}, {"uuid": "5c48a7d6-4303-4448-96cc-6a96d2a469c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/CyberSecurityIL/38653", "content": "\u05de\u05e2\u05e8\u05da \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05de\u05e4\u05e8\u05e1\u05dd \u05d4\u05d5\u05d3\u05e2\u05d4 \u05dc\u05e4\u05d9\u05d4 \u05db--30 \u05d0\u05dc\u05e3 \u05db\u05ea\u05d5\u05d1\u05d5\u05ea, \u05d4\u05de\u05e9\u05d5\u05d9\u05db\u05d5\u05ea \u05dc\u05d0\u05dc\u05e4\u05d9 \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc, \u05d7\u05e9\u05d5\u05e4\u05d5\u05ea \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05de\u05d9\u05d9\u05d3\u05d9\u05ea \u05d1\u05e9\u05dc \u05e9\u05ea\u05d9 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05e9\u05d4\u05ea\u05d2\u05dc\u05d5 \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05d7\u05d9\u05d1\u05d5\u05e8 \u05de\u05e8\u05d7\u05d5\u05e7 (VPN) \u05de\u05ea\u05d5\u05e6\u05e8\u05ea \u05e4\u05d5\u05e8\u05d8\u05d9\u05e0\u05d8.\n\n\u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05d1-9.2.24:\n\nCVE-2024-23113\nCVE-2024-21762\n\n\u05d0\u05dc \u05ea\u05d7\u05db\u05d5 \u05e2\u05dd \u05d6\u05d4, \u05ea\u05e2\u05d3\u05db\u05e0\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5. \u23f1\n\n\u05e8\u05d0\u05d9\u05ea\u05dd \u05de\u05d4 \u05e7\u05e8\u05d4 \u05dc\u05dc\u05d5\u05e7\u05d1\u05d9\u05d8 \u05e9\u05dc\u05d0 \u05e2\u05d9\u05d3\u05db\u05e0\u05d5 \u05d0\u05ea \u05d2\u05e8\u05e1\u05ea \u05d4-PHP \u05e9\u05dc\u05d4\u05dd \ud83d\ude09\n\nhttps://t.me/CyberSecurityIL/4681\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea #\u05d9\u05e9\u05e8\u05d0\u05dc", "creation_timestamp": "2024-02-22T11:12:47.000000Z"}, {"uuid": "db851a2c-4163-4308-aac6-110e64876d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23114", "type": "seen", "source": "https://t.me/ctinow/203287", "content": "https://ift.tt/5lanuwY\nCVE-2024-23114 | Apache Camel up to 3.21.3/3.22.0/4.0.3 CassandraQL deserialization", "creation_timestamp": "2024-03-08T13:26:24.000000Z"}, {"uuid": "f241f2e1-a43d-4d17-9c0f-6bfc64ded49c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/true_secator/5396", "content": "Fortinet \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u043d\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 FortiOS SSL VPN, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\nCVE-2024-21762 (FG-IR-24-015) \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 CVSS 9,6 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u0438 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446 \u0432 FortiOS.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b.\n\n\u0414\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u0448\u0438\u0431\u043a\u0438, Fortinet \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0430 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0435\u0441\u043b\u0438 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435 \u0443\u0434\u0430\u0435\u0442\u0441\u044f - \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043c\u043e\u0436\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c, \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0432 SSL VPN \u043d\u0430 \u0441\u0432\u043e\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0441 FortiOS.\n\n\u0427\u0442\u043e \u0436\u0435 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, Fortinet \u043d\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e\u043c, \u043a\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\n\u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043b\u0438\u0448\u044c \u0442\u043e, \u0447\u0442\u043e \u043e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043d\u0430\u0440\u044f\u0434\u0443 \u0441 \u043d\u0435\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0438 \u043f\u043e \u0434\u0440\u0443\u0433\u0438\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445: CVE-2024-23113 (\u0440\u0435\u0439\u0442\u0438\u043d\u0433 9,8), CVE-2023-44487 \u0438 CVE-2023-47537 (\u043e\u0431\u0435 \u0441\u043e \u0441\u0440\u0435\u0434\u043d\u0438\u043c \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c). \u041e\u0434\u043d\u0430\u043a\u043e \u0438\u0445 \u043d\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438 \u043a\u0430\u043a \u0440\u0435\u0430\u043b\u044c\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0432 \u0432\u0438\u0434\u0443 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f CVE-2024-21762 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.", "creation_timestamp": "2024-02-09T11:20:05.000000Z"}, {"uuid": "719e7732-620c-41ad-91df-687184475abe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/true_secator/5504", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Shadowserver \u0434\u0430\u044e\u0442 \u043d\u0435\u0443\u0442\u0435\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0443, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043e\u043a\u043e\u043b\u043e 150 000 \u0432\u0435\u0431-\u0448\u043b\u044e\u0437\u043e\u0432 Fortinet FortiOS \u0438 FortiProxy \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 CVE-2024-21762, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0431\u043e\u043b\u0435\u0435 24 000 - \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0432 \u0421\u0428\u0410, \u0437\u0430 \u043d\u0438\u043c\u0438 \u0441\u043b\u0435\u0434\u0443\u044e\u0442 \u0418\u043d\u0434\u0438\u044f, \u0411\u0440\u0430\u0437\u0438\u043b\u0438\u044f \u0438 \u041a\u0430\u043d\u0430\u0434\u0430. \n\n\u0418 \u0432\u0441\u0435 \u044d\u0442\u043e \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0430\u044f CISA \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0438 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0432\u043e\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (KEV), \u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0441 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u043c\u0435\u0441\u044f\u0446\u0430.\n\n\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f CVE-2024-21762 (CVSS 9,8, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e NIST), \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043c\u0430\u0448\u0438\u043d\u044b.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e \u0442\u043e\u043c, \u043a\u0442\u043e \u0438 \u043a\u0430\u043a \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 \u0441\u0432\u043e\u0438\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f\u0445, \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u044b \u0438, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0431\u043e\u043b\u0435\u0435 \u0438\u0437\u043e\u0449\u0440\u0435\u043d\u043d\u044b\u043c\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\n\u0413\u043b\u0443\u0431\u043e\u043a\u043e \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0432\u0448\u0430\u044f \u043a\u043e\u0440\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u0438\u0447\u0438\u043d\u044b \u0434\u0432\u0443\u0445 \u043d\u0435\u0434\u0430\u0432\u043d\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u043e\u043c\u0438\u043c\u043e \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u043e\u0439 \u0438 CVE-2024-23113, BishopFox \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u043c Python \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043b\u0438 \u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SSL VPN.\n\n\u041d\u043e, \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0430\u0447\u0430\u0432\u0448\u0443\u044e\u0441\u044f \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043c\u0443\u0434\u0430\u043a\u043e\u0432 \u0443\u0436\u0435 \u0432\u0440\u044f\u0434 \u043b\u0438 \u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c. \u0411\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-03-11T12:01:50.000000Z"}, {"uuid": "0256f7fb-b5c0-4df7-ba22-c2468d3a8f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1552", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\n\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol, circumventing authentication. Referred to as FortiJump, this vulnerability provides unauthorized access to FortiManager, enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes. \n\n\ud83d\udee0 Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\n\n\ud83d\udd17 Research: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n\ud83d\udd17 Source: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#fortinet #fortimanager #fgfm #unauth #rce", "creation_timestamp": "2024-11-15T07:09:37.000000Z"}, {"uuid": "ad8487b5-6d12-4606-a453-63070efa58d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23112", "type": "seen", "source": "https://t.me/ctinow/205828", "content": "https://ift.tt/cF9JBtz\nCVE-2024-23112", "creation_timestamp": "2024-03-12T16:32:14.000000Z"}, {"uuid": "f29e0fa1-715b-4b41-aa5b-18fa39dec43e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23112", "type": "seen", "source": "https://t.me/ctinow/205812", "content": "https://ift.tt/cF9JBtz\nCVE-2024-23112", "creation_timestamp": "2024-03-12T16:26:45.000000Z"}, {"uuid": "d369b2eb-e9d4-475d-a094-a0ee7b126a9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9327", "content": "Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575\n\nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/", "creation_timestamp": "2024-11-15T08:45:15.000000Z"}, {"uuid": "c114e9ff-3d08-4b43-8112-13dd378bd94b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ctinow/198405", "content": "https://ift.tt/qLOT2V5\nCVE-2024-23113 | Fortinet FortiOS up to 7.0.13/7.2.6/7.4.2 fgfmd format string (FG-IR-24-029)", "creation_timestamp": "2024-03-02T16:11:49.000000Z"}, {"uuid": "22841d4a-0b16-4a20-91bb-e4c406c15782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23114", "type": "seen", "source": "https://t.me/ctinow/188143", "content": "https://ift.tt/2K7BZhp\nCVE-2024-23114", "creation_timestamp": "2024-02-20T06:31:42.000000Z"}, {"uuid": "7663dfc5-fd08-4d42-9e7c-8c8d8b2d641f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ctinow/185617", "content": "https://ift.tt/MzbVn1E\nCVE-2024-23113", "creation_timestamp": "2024-02-15T15:31:44.000000Z"}, {"uuid": "13a300fa-94aa-4dd4-8fd4-7c499535117a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ctinow/204053", "content": "https://ift.tt/7OdCGz0\nCVE-2024-23113 Exploit", "creation_timestamp": "2024-03-09T20:16:47.000000Z"}, {"uuid": "2029ce37-646c-4aa0-b856-47de53a066a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23114", "type": "seen", "source": "https://t.me/ctinow/188679", "content": "https://ift.tt/90NzMU2\nCVE-2024-23114", "creation_timestamp": "2024-02-20T16:37:10.000000Z"}, {"uuid": "6529e094-6c67-46f6-9edf-cea6d9fddb2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/thehackernews/5713", "content": "\u26a0\ufe0f Cyber Alerts: \n \n\u2014Fortinet CVE-2024-23113 actively exploited, patch by Oct 30! \n\u2014Palo Alto Expedition vulnerable to SQL &amp; OS injection. \n\u2014Cisco patches critical bug in Nexus Dashboard Fabric Controller. \n \nRead: https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html \n \nCritical systems must be patched immediately.", "creation_timestamp": "2024-10-10T08:11:45.000000Z"}, {"uuid": "faabb1fc-686f-4ef7-a7a4-d7d1b999c87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3320", "content": "https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/\n\nFortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024\n#\u5206\u6790", "creation_timestamp": "2024-10-15T16:56:03.000000Z"}, {"uuid": "2be3ab01-bcd5-4fe3-95ae-9162605b0fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11287", "content": "#AppSec\n#Threat_Research\n1. New Supply Chain Attack Technique Can Trojanize All Your CLI Commands\nhttps://checkmarx.com/blog/this-new-supply-chain-attack-technique-can-trojanize-all-your-cli-commands\n2. Fortinet FortiGate CVE-2024-23113 -\nA Super Complex Vulnerability In A Super Secure Appliance In 2024\nhttps://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/\n]-&gt; PoC: https://github.com/CheckCve2/CVE-2024-23113", "creation_timestamp": "2024-10-15T14:13:43.000000Z"}, {"uuid": "5b641063-7527-4cfe-b161-e3af0d1cbbba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "Telegram/SaJKXt8OQhzDEe-5dugR50HuxezmSEkm7LMZtSRK2zCA", "content": "", "creation_timestamp": "2024-10-16T04:26:58.000000Z"}, {"uuid": "40c6bde6-29d7-48fd-9623-67a77cd2e972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/HackerInvestigationZone/32", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol circumventing authentication Referred to as FortiJump this vulnerability provides unauthorized access to FortiManager enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes\n\u2699\ufe0f Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\nResearch: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\nSource: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#Investigation_of_hacking", "creation_timestamp": "2024-11-15T15:06:06.000000Z"}, {"uuid": "8450e04c-f129-47da-8f04-a6431462c445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/2609", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\n\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol, circumventing authentication. Referred to as FortiJump, this vulnerability provides unauthorized access to FortiManager, enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes. \n\n\ud83d\udee0 Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\n\n\ud83d\udd17 Research: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n\ud83d\udd17 Source: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#fortinet #fortimanager #fgfm #unauth #rce", "creation_timestamp": "2025-02-15T16:51:49.000000Z"}]}