{"vulnerability": "CVE-2024-2583", "sightings": [{"uuid": "129326fd-d0eb-4444-a09d-fe2b3a6a3dad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25832", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6731", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC Script for CVE-2024-25832: Exploit chain reverse shell, information disclosure (root password leak) + unrestricted file upload in DataCube3\nURL\uff1ahttps://github.com/0xNslabs/CVE-2024-25832-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-06T04:16:31.000000Z"}, {"uuid": "895885f0-5e40-4084-9090-2035d54b3e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25839", "type": "seen", "source": "https://t.me/ctinow/198658", "content": "https://ift.tt/0ho7DGO\nCVE-2024-25839", "creation_timestamp": "2024-03-03T10:31:04.000000Z"}, {"uuid": "39d4fe9f-4b46-449d-8832-5d97e934a10d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25837", "type": "seen", "source": "https://t.me/cvedetector/3359", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25837 - October CMS Bloghub Plugin Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-25837 \nPublished : Aug. 16, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : A stored cross-site scripting (XSS) vulnerability in October CMS Bloghub Plugin v1.3.8 and lower allows attackers to execute arbitrary web scripts or HTML via a crafted payload into the Comments section. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T21:14:53.000000Z"}, {"uuid": "58464b71-2327-49e8-b514-f34f11d134da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25830", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/5331", "content": "https://system32.in/post/16_cve-2024-25830-and-cve-2024-25832-datacube3-improper-access-control-and-unrestri.html", "creation_timestamp": "2024-03-08T10:54:48.000000Z"}, {"uuid": "e921727e-6da2-4678-b34a-32d6188ee0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2583", "type": "seen", "source": "https://t.me/arpsyndicate/4675", "content": "#ExploitObserverAlert\n\nCVE-2024-2583\n\nDESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2583. The WP Shortcodes Plugin \u2014 Shortcodes Ultimate WordPress plugin before 7.0.5 does not properly escape some of its shortcodes attributes before they are echoed back to users, making it possible for users with the contributor role to conduct Stored XSS attacks.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.6809091", "creation_timestamp": "2024-04-14T12:06:40.000000Z"}, {"uuid": "31c8fe42-170b-4db2-96c9-8d33551b30be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25830", "type": "seen", "source": "https://t.me/arpsyndicate/4955", "content": "#ExploitObserverAlert\n\nCVE-2024-25830\n\nDESCRIPTION: Exploit Observer has 27 entries in 5 file formats related to CVE-2024-25830. F-logic DataCube3 v1.0 is vulnerable to Incorrect Access Control due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this, by sending a URI that contains the path of the configuration file. A successful exploit could allow the attacker to extract the root and admin password.\n\nFIRST-EPSS: 0.000430000\nARPS-PRIORITY: 0.8632316", "creation_timestamp": "2024-05-20T21:41:50.000000Z"}, {"uuid": "11b74af5-b87d-4cbf-83c4-3f4394b7e582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25832", "type": "seen", "source": "https://t.me/arpsyndicate/4953", "content": "#ExploitObserverAlert\n\nCVE-2024-25832\n\nDESCRIPTION: Exploit Observer has 27 entries in 5 file formats related to CVE-2024-25832. F-logic DataCube3 v1.0 is vulnerable to unrestricted file upload, which could allow an authenticated malicious actor to upload a file of dangerous type by manipulating the filename extension.\n\nFIRST-EPSS: 0.000430000\nARPS-PRIORITY: 0.8632316", "creation_timestamp": "2024-05-20T21:29:56.000000Z"}, {"uuid": "2cfae79b-bb3a-43a3-a30e-ef123c2702ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25832", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1934", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c DataCube3\nPOC  \u0441\u043e\u0447\u0435\u0442\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u0435 CVE-2024-25830 (\u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430) \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u0435\u0439 root \u0438 CVE-2024-25832 (\u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u0430\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0444\u0430\u0439\u043b\u043e\u0432) \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f reverse shell\n*\nPOC", "creation_timestamp": "2024-03-06T19:16:14.000000Z"}, {"uuid": "2c22d03a-2c4a-41a0-bdbe-4497be8bbd06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25830", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1934", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c DataCube3\nPOC  \u0441\u043e\u0447\u0435\u0442\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u0435 CVE-2024-25830 (\u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430) \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u0435\u0439 root \u0438 CVE-2024-25832 (\u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u0430\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0444\u0430\u0439\u043b\u043e\u0432) \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f reverse shell\n*\nPOC", "creation_timestamp": "2024-03-06T19:16:14.000000Z"}, {"uuid": "d6a9f461-02af-475c-9df1-ed1552ae90db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25832", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/5331", "content": "https://system32.in/post/16_cve-2024-25830-and-cve-2024-25832-datacube3-improper-access-control-and-unrestri.html", "creation_timestamp": "2024-03-08T10:54:48.000000Z"}, {"uuid": "485146e5-e5b2-4ef0-8f9a-4c552d9dd054", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25839", "type": "seen", "source": "https://t.me/ctinow/198654", "content": "https://ift.tt/0ho7DGO\nCVE-2024-25839", "creation_timestamp": "2024-03-03T10:26:22.000000Z"}]}