{"vulnerability": "CVE-2024-31848", "sightings": [{"uuid": "a960e753-4490-441d-87f8-69632e865e4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31848", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2473", "content": "https://github.com/Stuub/CVE-2024-31848-PoC\n\nGET  /ui/..\\src\\getSettings.rsb?@json\n\n#poc #exploit", "creation_timestamp": "2024-06-16T16:44:22.000000Z"}, {"uuid": "49a5be8f-eb30-43f3-baf8-43e54b6e51f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31848", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7241", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal \nURL\uff1ahttps://github.com/Stuub/CVE-2024-31848-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-07T10:54:35.000000Z"}, {"uuid": "63cbe00b-893a-4642-b349-26253836531b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31848", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/211", "content": "\ud83d\udea8POC RELEASED\ud83d\udea8PoC for CData within Jetty servers released (CVE-2024-31848/49/50/51). File Path Traversal &amp; File Read. https://github.com/Stuub/CVE-2024-31848-PoC\n\n#DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Infosec #CTI #CVE202431848 #Vulnerability\n\nA prototype PoC for the automation of vulnerability analysis on targets running CData applications on an embedded Jetty server.\n\nX Link: https://twitter.com/DarkWebInformer/status/1788607746545226054", "creation_timestamp": "2024-05-09T20:56:51.000000Z"}, {"uuid": "97342d8a-6e2b-4767-be29-75d9ae51ff5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31848", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/118", "content": "#exploit\n1. SQL Injection to RCE in Apple Masa/Mura CMS\nhttps://blog.projectdiscovery.io/hacking-apple-with-sql-injection\n\n2. CVE-2024-31848,\nCVE-2024-31849,\nCVE-2024-31850,\nCVE-2024-31851:\nJetty Server File Path Traversal\nhttps://github.com/Stuub/CVE-2024-31848-PoC", "creation_timestamp": "2024-05-10T08:17:13.000000Z"}, {"uuid": "7e9d8732-40f9-4cab-af3f-97a0fd47d503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31848", "type": "seen", "source": "Telegram/K6PCb4_-lX7w9-2V3EkuWDbxgtQ_4wiK9Hiy049ilypP-Jw", "content": "", "creation_timestamp": "2024-05-05T17:10:20.000000Z"}, {"uuid": "2c3b16d4-cf2a-42d2-b20f-18eff489292f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31848", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10480", "content": "#exploit\n1. SQL Injection to RCE in Apple Masa/Mura CMS\nhttps://blog.projectdiscovery.io/hacking-apple-with-sql-injection\n\n2. CVE-2024-31848, CVE-2024-31849,\nCVE-2024-31850, CVE-2024-31851:\nJetty Server File Path Traversal\nhttps://github.com/Stuub/CVE-2024-31848-PoC", "creation_timestamp": "2024-05-10T19:37:07.000000Z"}]}