{"vulnerability": "CVE-2024-5560", "sightings": [{"uuid": "eb2a1225-0bab-4b16-885f-e57796f9d2c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55601", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113624946852005474", "content": "", "creation_timestamp": "2024-12-09T21:18:16.816483Z"}, {"uuid": "9a93c43b-af79-448b-80fa-4002dfe64514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55603", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113676532984953254", "content": "", "creation_timestamp": "2024-12-18T23:57:18.839923Z"}, {"uuid": "d936943e-6b0e-4928-8cbb-612c930c9008", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3opaw46l2g", "content": "", "creation_timestamp": "2025-01-06T17:43:27.565771Z"}, {"uuid": "7ba68bac-fb52-47d4-9778-14bc788cce1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113782530465783993", "content": "", "creation_timestamp": "2025-01-06T17:13:51.994214Z"}, {"uuid": "c3e10f3f-d5b1-48c9-9806-c82d7963ccba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3n6bko2b2m", "content": "", "creation_timestamp": "2025-01-06T17:16:03.831724Z"}, {"uuid": "17862be9-a1f0-4f23-aa07-83d68bd354cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5560", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-107-02", "content": "", "creation_timestamp": "2025-04-17T10:00:00.000000Z"}, {"uuid": "34470e69-a814-4849-b2c8-4bed7a0a4297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://bsky.app/profile/osintbot.bsky.social/post/3lzddy34xl22j", "content": "", "creation_timestamp": "2025-09-21T07:16:43.011125Z"}, {"uuid": "e4581119-79f6-4a27-834c-0fa3cb934c75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55604", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8662", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55604\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Appsmith is a platform to build admin panels, internal tools, and dashboards. Users invited as \"App Viewer\" should not have access to development information of a workspace. Datasources are such a component in a workspace. Yet, in versions of Appsmith prior to 1.51, app viewers are able to get a list of datasources in a workspace they're a member of. This information disclosure does NOT expose sensitive data in the datasources, such as database passwords and API Keys. The attacker needs to have been invited to a workspace as a \"viewer\", by someone in that workspace with access to invite. The attacker then needs to be able to signup/login to that Appsmith instance. The issue is patched in version 1.51. No known workarounds are available.\n\ud83d\udccf Published: 2025-03-25T14:15:05.339Z\n\ud83d\udccf Modified: 2025-03-25T14:15:05.339Z\n\ud83d\udd17 References:\n1. https://github.com/appsmithorg/appsmith/security/advisories/GHSA-794x-gm8v-2wj6", "creation_timestamp": "2025-03-25T14:24:13.000000Z"}, {"uuid": "b005698f-00b0-4b70-8aa5-1b13eaf73965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55603", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "320a3e6e-4490-4cb7-a0cf-fb1ed648c8a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55603", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:03.000000Z"}, {"uuid": "0f835923-055c-41a8-b192-9a552afd6c79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://t.me/cvedetector/14388", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55605 - Suricata Stack-Based Buffer Overflow Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-55605 \nPublished : Jan. 6, 2025, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T19:26:47.000000Z"}, {"uuid": "be7c0aae-4e71-4239-86be-7be35993a264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://t.me/ptescalator/199", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Suricata \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 7.0.8 \u0441\u0432\u043e\u0435\u0439 IDS/IPS-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u0432\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445, CVE-2024-55627 \u0438 CVE-2024-55605, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435, CVE-2024-55628 \u0438 CVE-2024-55629 \u043e\u0442\u043d\u0435\u0441\u0435\u043d\u044b \u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0438 \u043e\u0441\u0442\u0430\u0432\u0448\u0430\u044f\u0441\u044f CVE-2024-55626 - \u043a \u043d\u0438\u0437\u043a\u043e\u043c\u0443.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c: \u0410\u043b\u0435\u043a\u0441\u0435\u0439 \u0421\u0438\u043c\u0430\u043a\u043e\u0432, \u041d\u043e\u0439 \u041b\u044e, \u0420\u043e\u043c\u0430\u043d \u0415\u0436\u043e\u0432 (Positive Technologies), \u0421\u0430\u0448\u0430 \u0421\u0442\u0435\u0439\u043d\u0431\u0438\u0441\u0441, \u0421\u0438\u043c\u0435\u043d \u041b\u0438\u0431\u0435\u043a\u043a, Team Superflat, \u0417\u0435\u043c\u0435\u0442\u0440\u0438 \u041a\u0430\u043c\u0438\u043c\u0438\u0434\u0437\u0443, Oss-Fuzz, Coverity.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043a\u0430 \u043c\u0430\u043b\u043e, \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-12-19T13:01:33.000000Z"}, {"uuid": "aff14f95-9212-43c9-8477-bf89c5747382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55604", "type": "seen", "source": "https://t.me/cvedetector/21107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55604 - Appsmith Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55604 \nPublished : March 25, 2025, 3:15 p.m. | 46\u00a0minutes ago \nDescription : Appsmith is a platform to build admin panels, internal tools, and dashboards. Users invited as \"App Viewer\" should not have access to development information of a workspace. Datasources are such a component in a workspace. Yet, in versions of Appsmith prior to 1.51, app viewers are able to get a list of datasources in a workspace they're a member of. This information disclosure does NOT expose sensitive data in the datasources, such as database passwords and API Keys. The attacker needs to have been invited to a workspace as a \"viewer\", by someone in that workspace with access to invite. The attacker then needs to be able to signup/login to that Appsmith instance. The issue is patched in version 1.51. No known workarounds are available. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T17:49:15.000000Z"}, {"uuid": "7969d520-9285-42f1-b97f-df021ec2219b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55602", "type": "seen", "source": "https://t.me/cvedetector/12522", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55602 - PwnDoc Path Traversal Vulnerability (Arbitrary File Read)\", \n  \"Content\": \"CVE ID : CVE-2024-55602 \nPublished : Dec. 10, 2024, 5:15 p.m. | 35\u00a0minutes ago \nDescription : PwnDoc is a penetration test report generator. Prior to commit 1d4219c596f4f518798492e48386a20c6e9a2fe6, an authenticated user who is able to update and download templates can inject path traversal (`../`) sequences into the file extension property to read arbitrary files on the system. Commit 1d4219c596f4f518798492e48386a20c6e9a2fe6 contains a patch for the issue. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T19:08:49.000000Z"}, {"uuid": "ec68bc48-c168-4fdd-bdfd-61250830b718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://t.me/true_secator/6543", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Suricata \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 7.0.8 \u0441\u0432\u043e\u0435\u0439 IDS/IPS-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u0432\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445, CVE-2024-55627 \u0438 CVE-2024-55605, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435, CVE-2024-55628 \u0438 CVE-2024-55629 \u043e\u0442\u043d\u0435\u0441\u0435\u043d\u044b \u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0438 \u043e\u0441\u0442\u0430\u0432\u0448\u0430\u044f\u0441\u044f CVE-2024-55626 - \u043a \u043d\u0438\u0437\u043a\u043e\u043c\u0443.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c: \u0410\u043b\u0435\u043a\u0441\u0435\u0439 \u0421\u0438\u043c\u0430\u043a\u043e\u0432, \u041d\u043e\u0439 \u041b\u044e, \u0420\u043e\u043c\u0430\u043d \u0415\u0436\u043e\u0432 (Positive Technologies), \u0421\u0430\u0448\u0430 \u0421\u0442\u0435\u0439\u043d\u0431\u0438\u0441\u0441, \u0421\u0438\u043c\u0435\u043d \u041b\u0438\u0431\u0435\u043a\u043a, Team Superflat, \u0417\u0435\u043c\u0435\u0442\u0440\u0438 \u041a\u0430\u043c\u0438\u043c\u0438\u0434\u0437\u0443, Oss-Fuzz, Coverity.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043a\u0430 \u043c\u0430\u043b\u043e, \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-12-16T12:57:32.000000Z"}, {"uuid": "41e8cdfa-df0e-4639-963d-d8e1ed9d477c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55603", "type": "seen", "source": "https://t.me/cvedetector/13286", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55603 - Kanboard Session Lifetime Verification Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-55603 \nPublished : Dec. 19, 2024, 12:15 a.m. | 38\u00a0minutes ago \nDescription : Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`).  \nThus, a session which's lifetime is already `&gt; time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T02:15:15.000000Z"}, {"uuid": "abf4f74c-cf0f-463b-b223-1688d0559773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55601", "type": "seen", "source": "https://t.me/cvedetector/12451", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55601 - Hugo Unescaped Attributes in Internal Templates Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55601 \nPublished : Dec. 9, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T23:54:37.000000Z"}]}