{"vulnerability": "CVE-2024-5243", "sightings": [{"uuid": "21339492-eba3-4551-8ae3-2ab7597456c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52433", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113504413378781317", "content": "", "creation_timestamp": "2024-11-18T14:25:01.939900Z"}, {"uuid": "f5a17ca7-861b-42cd-9d09-132721bdb95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52434", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113504472383626686", "content": "", "creation_timestamp": "2024-11-18T14:40:02.293552Z"}, {"uuid": "e9045648-a89f-479c-8115-c58568c6e4fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52435", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113504498789855173", "content": "", "creation_timestamp": "2024-11-18T14:46:45.660640Z"}, {"uuid": "0637b449-c434-4052-935c-8f1f119f67f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52431", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113504498775507866", "content": "", "creation_timestamp": "2024-11-18T14:46:44.983634Z"}, {"uuid": "7ac56572-800f-4916-9592-bd8f92e8de09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52439", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515070825253153", "content": "", "creation_timestamp": "2024-11-20T11:35:21.881697Z"}, {"uuid": "0eed37bf-bd77-40eb-b9e1-d34e73fc5cc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52437", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515220547823978", "content": "", "creation_timestamp": "2024-11-20T12:13:26.211259Z"}, {"uuid": "810136d0-c609-48a8-9324-6a9a4992f30b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52438", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515220563160219", "content": "", "creation_timestamp": "2024-11-20T12:13:26.539778Z"}, {"uuid": "efce75af-49ba-4f87-868b-faa7d3262626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52433", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783265738684412", "content": "", "creation_timestamp": "2025-01-06T20:20:51.295265Z"}, {"uuid": "145061e2-39d2-43e5-a5ff-8181784f3099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52430", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783264439927821", "content": "", "creation_timestamp": "2025-01-06T20:20:31.287660Z"}, {"uuid": "c197413f-6fe2-40f9-bb1e-bdd93ef8801c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5243", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3me7f227wvb2b", "content": "", "creation_timestamp": "2026-02-06T17:02:11.996056Z"}, {"uuid": "54455143-a7a8-4cd9-8b61-a6d76f6e12a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52436", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "149b8e19-0065-442f-9604-17ef052fd37b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52433", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "a99b8742-285f-480b-b1d4-e1e1ee420d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52430", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "6284120c-43c6-4e37-9f25-ec68d2cb4e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52431", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "3a3b2a45-56f3-4d8f-b620-f37cb62eae36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5243", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mev5ydq6ox2e", "content": "", "creation_timestamp": "2026-02-15T08:54:32.775263Z"}, {"uuid": "412fab55-7cc3-4f37-8a00-0f9434be1713", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5243", "type": "seen", "source": "https://bsky.app/profile/alexandreborges.bsky.social/post/3medzkuvjt222", "content": "", "creation_timestamp": "2026-02-08T13:20:11.661861Z"}, {"uuid": "3a4b1af1-664b-44da-930d-5f07f296a51e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5243", "type": "seen", "source": "https://infosec.exchange/users/alexandreborges/statuses/116035210616130967", "content": "", "creation_timestamp": "2026-02-08T13:20:12.578526Z"}, {"uuid": "9223ef4e-c9c1-4818-90f9-bc3722a5abfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52433", "type": "published-proof-of-concept", "source": "https://t.me/four_rays/17", "content": "\u041e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u043f\u043b\u0430\u0433\u0438\u043d WordPress. CVE-2024-52433.\n\n\u041d\u0435 \u0442\u0430\u043a \u0434\u0430\u0432\u043d\u043e \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 WordPress Mindstien Technologies My Geo Posts Free, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-52433. \n\u0418\u0437-\u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u043e\u0431\u044a\u0435\u043a\u0442\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0446\u0435\u043f\u043e\u0447\u0435\u043a, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a RCE. \n\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u043b\u0430\u0433\u0438\u043d\u0430 \u0434\u043e 1.2.\n\n\u0415\u0441\u043b\u0438 \u0432\u0430\u0448\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 Mindstien Technologies My Geo Posts Free, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u0438 \u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u043f\u043e \u043c\u0435\u0440\u0435 \u0432\u044b\u0445\u043e\u0434\u0430 \u0432\u0435\u043d\u0434\u043e\u0440\u0441\u043a\u043e\u0433\u043e \u043f\u0430\u0442\u0447\u0430.\n\n\u0412 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u044d\u043c\u0443\u043b\u044f\u0446\u0438\u0438 \u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u0432\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0443\u0447\u0430\u0441\u0442\u043a\u0430 \u043a\u043e\u0434\u0430 \u043f\u043b\u0430\u0433\u0438\u043d\u0430 Mindstien Technologies My Geo Posts Free:\n \n$mdata = unserialize(stripslashes(base64_decode($_COOKIE['mgpf_geo_coockie'])));\n\n\u0422\u043e \u0435\u0441\u0442\u044c \u043f\u0440\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 COOKIE mgpf_geo_coockie \u0441\u043e \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435\u043c, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u043c, TzoxNDoiVnVsbmVyYWJsZUNsYXNzIjoxOntzOjc6ImNvbW1hbmQiO3M6MTI6ImVjaG8gJ0hhY2tlZCEnIjt9\u2026\n\n\u2026\u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435:\n1) \u043e\u0442\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u044f base64_decode, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u0443\u0435\u0442 \u043f\u0435\u0440\u0435\u0434\u0430\u043d\u043d\u0443\u044e \u0441\u0442\u0440\u043e\u043a\u0443 \u0432 \nO:14:\"VulnerableClass\":1:{s:7:\"command\";s:12:\"echo 'Hacked!'\";}\n2) \u0434\u0430\u043b\u0435\u0435 \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044f stripslashes, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u0431\u0435\u0440\u0435\u0442 \u0441\u043b\u0435\u0448\u0438, \n\u0432 \u043d\u0430\u0448\u0435\u043c \u043f\u0440\u0438\u043c\u0435\u0440\u0435 \u0438\u0445 \u043d\u0435\u0442;\n3) \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f unserialize, \u043e\u0431\u044a\u0435\u043a\u0442 $object \u0431\u0443\u0434\u0435\u0442 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u043e\u043c \u043a\u043b\u0430\u0441\u0441\u0430 VulnerableClass \u0441 \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u043e\u043c command, \u0440\u0430\u0432\u043d\u044b\u043c echo 'Hacked!', \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440\n\nVulnerableClass Object\n(\n    [command] =&gt; echo 'Hacked!'\n)\n\u0421\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0435\u0441\u043b\u0438 \u0443 \u043d\u0430\u0441 \u0435\u0441\u0442\u044c \u043a\u043b\u0430\u0441\u0441 \u0432\u0440\u043e\u0434\u0435 \u044d\u0442\u043e\u0433\u043e:\n class VulnerableClass {\n    public $command;\n\n    public function __wakeup() {\n        system($this-&gt;command);\n    }\n}\n\n\u0422\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043e\u0431\u044a\u0435\u043a\u0442\u0430, \u043c\u043e\u0436\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434.\n\n\u041f\u043e\u0434\u0435\u043b\u0438\u043c\u0441\u044f \u0434\u0435\u0442\u0435\u043a\u0442\u0438\u0440\u0443\u044e\u0449\u0435\u0439 \u043b\u043e\u0433\u0438\u043a\u043e\u0439, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\u041d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432\u0441\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 COOKIE mgpf_geo_coockie, \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043f\u0440\u0438 \u0434\u0435\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 \u0438\u0437 base64 \u0434\u0430\u0441\u0442 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0441\u0442\u0440\u043e\u043a\u0443 \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043e\u0431\u044a\u0435\u043a\u0442\u0430; \n\u044d\u0442\u0443 \u0441\u0442\u0440\u043e\u043a\u0443 \u043c\u043e\u0436\u043d\u043e \u043e\u043f\u0438\u0441\u0430\u0442\u044c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u044b\u043c \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0435\u043c:\nO:\\d+:\\\"[a-zA-Z0-9_-]+\\\":\\d+:(\\{s:\\d+:\\\"[a-zA-Z0-9_-]+\\\";(a|s|i|b|O):\\d+|{})", "creation_timestamp": "2024-11-28T10:31:19.000000Z"}, {"uuid": "997d7e65-7f3f-4b51-aaec-678c11bc45b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52431", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mcawxu7v7r2m", "content": "", "creation_timestamp": "2026-01-12T21:05:22.006719Z"}, {"uuid": "2f787eb7-8a0c-4d2c-83d1-deb4c24cf523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52430", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mih77vbxn72w", "content": "", "creation_timestamp": "2026-04-01T17:20:09.830297Z"}, {"uuid": "30765ead-5b62-4f97-904b-f35464fb8c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52432", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mihadn4lw42c", "content": "", "creation_timestamp": "2026-04-01T17:40:09.375906Z"}, {"uuid": "191c1e10-5953-4e9c-96e6-49195767f320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52435", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3minuopttqu2c", "content": "", "creation_timestamp": "2026-04-04T09:00:14.342064Z"}, {"uuid": "c1fb8ee3-55a6-49b5-8ccd-64639bf14a36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52436", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miopj2vlau2f", "content": "", "creation_timestamp": "2026-04-04T17:00:15.476480Z"}, {"uuid": "ffb1348b-4322-4579-9363-a71180fa0380", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52433", "type": "published-proof-of-concept", "source": "https://t.me/four_rays/24", "content": "\u0421\u043d\u043e\u0432\u0430 Wordpress, \u0441\u043d\u043e\u0432\u0430 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-24926 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043e\u0431\u044a\u0435\u043a\u0442\u044b \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439 \u0442\u0435\u043c\u0443 WordPress Brooklyn (\u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 4.9.7.6).  \u041f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430.\n\nCWE-502\n\nCVSS 7,5 (\u0432\u044b\u0441\u043e\u043a\u0438\u0439)\n\n\u041d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f!\n\nPoC \u0443\u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 \u043d\u0430 \u043f\u0440\u043e\u0441\u0442\u043e\u0440\u0430\u0445 github. \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043c \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u0443\u044e \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438:\ndata=O:15:\"MaliciousObject\":1:{s:3:\"cmd\";s:14:\"system('whoami')\n\n\u041c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0441\u0445\u043e\u0436 \u0441 CVE-2024-52433, \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u0438\u0435 \u2014 \u044d\u0442\u043e \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438.\n\n\u0415\u0441\u043b\u0438 \u0432\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435 WordPress Brooklyn, \u0442\u043e \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043e\u0432\u0435\u0442\u0443\u0435\u043c \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c POST-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0441 body, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e\u043c\u0443 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u044e:\nO:\\d+:\\\"[a-zA-Z0-9_-]+\\\":\\d+:(\\{s:\\d+:\\\"[a-zA-Z0-9_-]+\\\";(a|s|i|b|O):\\d+|{})", "creation_timestamp": "2024-12-11T15:01:35.000000Z"}, {"uuid": "9b662c25-cede-463b-b9d5-aeca32f83d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52439", "type": "seen", "source": "https://t.me/cvedetector/11598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52439 - Mark O'Donnell Team Rosters Untrusted Data Object Injection\", \n  \"Content\": \"CVE ID : CVE-2024-52439 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Mark O\u2019Donnell Team Rosters allows Object Injection.This issue affects Team Rosters: from n/a through 4.6. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:35.000000Z"}, {"uuid": "54af0ef4-ae81-45fd-bee2-1506adc8ccf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52437", "type": "seen", "source": "https://t.me/cvedetector/11597", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52437 - Banner System Missing Authentication Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52437 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Missing Authentication for Critical Function vulnerability in Saul Morales Pacheco Banner System allows Privilege Escalation.This issue affects Banner System: from n/a through 1.0.0. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:35.000000Z"}, {"uuid": "c6838458-8259-4d80-a0be-4efec234a0d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52438", "type": "seen", "source": "https://t.me/cvedetector/11595", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52438 - De:branding Missing Authentication Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-52438 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Missing Authentication for Critical Function vulnerability in deco.Agency de:branding allows Privilege Escalation.This issue affects de:branding: from n/a through 1.0.2. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:33.000000Z"}, {"uuid": "7b04a9a2-e109-4408-8e8d-f713d1bf2d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52435", "type": "seen", "source": "https://t.me/cvedetector/11341", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52435 - W3 Eden, Inc. Premium Packages SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-52435 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in W3 Eden, Inc. Premium Packages allows SQL Injection.This issue affects Premium Packages: from n/a through 5.9.3. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:08.000000Z"}, {"uuid": "166220c2-766b-4905-ad8a-ac55e9933a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52430", "type": "seen", "source": "https://t.me/cvedetector/11344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52430 - Lis Lis Video Gallery Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52430 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Lis Lis Video Gallery allows Object Injection.This issue affects Lis Video Gallery: from n/a through 0.2.1. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:11.000000Z"}, {"uuid": "94993cda-e194-416d-84ef-51f5f04f032e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52436", "type": "seen", "source": "https://t.me/cvedetector/11342", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52436 - Post SMTP SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-52436 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Post SMTP allows Blind SQL Injection.This issue affects Post SMTP: from n/a through 2.9.9. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:09.000000Z"}, {"uuid": "fb726361-228f-45ea-a2b5-4b1ce8e3f6c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52434", "type": "seen", "source": "https://t.me/cvedetector/11340", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52434 - Supsystic Popup Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52434 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Popup by Supsystic allows Command Injection.This issue affects Popup by Supsystic: from n/a through 1.10.29. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:07.000000Z"}, {"uuid": "71dba8aa-3650-42e0-80d2-3c7a9126c96a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52433", "type": "seen", "source": "https://t.me/cvedetector/11339", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52433 - Mindstien Technologies My Geo Posts Free Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52433 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free allows Object Injection.This issue affects My Geo Posts Free: from n/a through 1.2. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:06.000000Z"}, {"uuid": "04daa291-456a-45f5-ba7e-7df7d244de5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52432", "type": "seen", "source": "https://t.me/cvedetector/11346", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52432 - NIX Anti-Spam Light Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52432 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in NIX Solutions Ltd NIX Anti-Spam Light allows Object Injection.This issue affects NIX Anti-Spam Light: from n/a through 0.0.4. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:13.000000Z"}, {"uuid": "75bc5b30-cf8c-494f-bcc2-88aaa424c816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52431", "type": "seen", "source": "https://t.me/cvedetector/11345", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52431 - Pressaholic WordPress Video Robot SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-52431 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pressaholic WordPress Video Robot - The Ultimate Video Importer allows SQL Injection.This issue affects WordPress Video Robot - The Ultimate Video Importer: from n/a through 1.20.0. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:12.000000Z"}, {"uuid": "ecc87a07-f7e0-4c22-9eaf-7aa319e84279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5243", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10813", "content": "#exploit\nWAN-to-LAN Exploit Showcase (CVE-2024-5242, CVE-2024-5243, CVE-2024-5244)\nhttps://claroty.com/team82/research/pwn2own-wan-to-lan-exploit-showcase", "creation_timestamp": "2024-07-10T17:39:07.000000Z"}]}