{"vulnerability": "CVE-2024-23724", "sightings": [{"uuid": "7d7f66ea-09af-4906-998e-e59709eec6b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23724", "type": "published-proof-of-concept", "source": "https://t.me/poxek/3708", "content": "CVE-2024-23724: Ghost CMS Stored XSS Leading to Owner Takeover\n\n\u0412\u0441\u0435 \u0433\u0435\u043d\u0438\u0430\u043b\u044c\u043d\u043e\u0435 \u2014 \u043f\u0440\u043e\u0441\u0442\u043e. \u0412 Ghost CMS, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 (\u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0432\u0440\u043e\u0434\u0435 OpenAI, Mozilla \u0438 Apple, \u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0435 \u0431\u043b\u043e\u0433\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u2014 \u043d\u0435\u0431\u0435\u0437\u044b\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 Offensive OSINT), \u043d\u0430\u0448\u043b\u0438 XSS. \n\n\u0417\u0430\u0431\u0430\u0432\u043d\u043e \u0442\u043e, \u0447\u0442\u043e \u0441\u044b\u0433\u0440\u0430\u043b \u0441\u0430\u043c\u044b\u0439 \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u043f\u044d\u0439\u043b\u043e\u0430\u0434 \u2014 SVG \u0441 Javascript'\u043e\u043c \u0432\u043d\u0443\u0442\u0440\u0438 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u0432\u0430\u0442\u0430\u0440\u043a\u0438, \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043c\u043e\u0434\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0439 \u2014 \u0433\u043e\u0442\u043e\u0432\u044b\u0439 \u0444\u0430\u0439\u043b \u0441 PayloadsAllTheThings.\n\nResearch: https://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss/\nExploit: https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724", "creation_timestamp": "2024-02-21T16:23:17.000000Z"}, {"uuid": "937e7c56-4874-4ac5-9e08-63a73b7557d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23724", "type": "seen", "source": "https://t.me/arpsyndicate/3521", "content": "#ExploitObserverAlert\n\nCVE-2024-23724\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-23724. Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that \"The vendor does not view this as a valid vector.\"\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-13T02:25:36.000000Z"}, {"uuid": "37cd8444-421c-4467-b980-87e07c973663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23724", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/4539", "content": "CVE-2024-23724: Ghost CMS Stored XSS Leading to Owner Takeover\n\n\u0412\u0441\u0435 \u0433\u0435\u043d\u0438\u0430\u043b\u044c\u043d\u043e\u0435 \u2014 \u043f\u0440\u043e\u0441\u0442\u043e. \u0412 Ghost CMS, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 (\u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0432\u0440\u043e\u0434\u0435 OpenAI, Mozilla \u0438 Apple, \u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0435 \u0431\u043b\u043e\u0433\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u2014 \u043d\u0435\u0431\u0435\u0437\u044b\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 Offensive OSINT), \u043d\u0430\u0448\u043b\u0438 XSS. \n\n\u0417\u0430\u0431\u0430\u0432\u043d\u043e \u0442\u043e, \u0447\u0442\u043e \u0441\u044b\u0433\u0440\u0430\u043b \u0441\u0430\u043c\u044b\u0439 \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u043f\u044d\u0439\u043b\u043e\u0430\u0434 \u2014 SVG \u0441 Javascript'\u043e\u043c \u0432\u043d\u0443\u0442\u0440\u0438 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u0432\u0430\u0442\u0430\u0440\u043a\u0438, \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043c\u043e\u0434\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0439 \u2014 \u0433\u043e\u0442\u043e\u0432\u044b\u0439 \u0444\u0430\u0439\u043b \u0441 PayloadsAllTheThings.\n\nResearch: https://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss/\nExploit: https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724", "creation_timestamp": "2024-02-21T17:57:20.000000Z"}, {"uuid": "75985665-ee64-4b85-9fbc-4ed430f8393b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23724", "type": "seen", "source": "https://t.me/ctinow/182676", "content": "https://ift.tt/81ZEiGw\nCVE-2024-23724", "creation_timestamp": "2024-02-11T02:21:54.000000Z"}, {"uuid": "d2ed441f-5ebf-47cd-89f6-11e9dd2072fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23724", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}]}