{"vulnerability": "CVE-2024-23749", "sightings": [{"uuid": "e6b84dc2-25d8-46d7-8ea9-867b139dfe95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/184478", "content": "https://ift.tt/qmHZh9g\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)", "creation_timestamp": "2024-02-14T08:56:59.000000Z"}, {"uuid": "3a82d6cc-ef8b-44d0-92ab-74e5561c42b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6859", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}, {"uuid": "d720c215-4c7f-46dc-8809-3b6fbf881198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/198452", "content": "https://ift.tt/sGbaXrV\nCVE-2024-23749 | KiTTY up to 0.76.1.13 filename command injection (ID 177031)", "creation_timestamp": "2024-03-02T19:21:23.000000Z"}, {"uuid": "c9f8d43f-ae77-4b35-85ec-01da6c65a236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/arpsyndicate/3377", "content": "#ExploitObserverAlert\n\nCVE-2024-23749\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23749. KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-02-11T13:04:04.000000Z"}, {"uuid": "16e8f14f-cbc2-49f7-8a4b-0e21b7fcf7a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/184827", "content": "https://ift.tt/zX2jMrY\nCVE-2024-23749 Exploit", "creation_timestamp": "2024-02-14T17:16:42.000000Z"}, {"uuid": "6aba6ff2-6c18-49d1-a8eb-9e96f7b273e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/CNArsenal/1987", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-02-16T04:17:14.000000Z"}, {"uuid": "00e5331b-ee91-40cc-9dc5-8a80adc3d5e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/181904", "content": "https://ift.tt/libAoBP\nCVE-2024-23749", "creation_timestamp": "2024-02-09T09:21:45.000000Z"}, {"uuid": "03f368e7-65bf-412e-8b99-13e34864ffac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}]}