Exploits from Github
542 subscribers
1 photo
633 files
3.57K links
Download Telegram
CVE-2024-53677.zip
34.9 KB
CVE-2024-53677
Author: seoyoung-kang

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.

This issue affects Apache Struts: from 2.0.0 before 6.4.0.

Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.

You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

GitHub Link:
https://github.com/seoyoung-kang/CVE-2024-53677
CVE-2017-10271.zip
9 KB
CVE-2017-10271
Author: seoyoung-kang

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

GitHub Link:
https://github.com/seoyoung-kang/CVE-2017-10271
CVE-2023-45612.zip
49.8 KB
CVE-2023-45612
Author: aecelen

In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE

GitHub Link:
https://github.com/aecelen/ktor-xxe-poc
CVE-2024-3094.zip
2.1 KB
CVE-2024-3094
Author: M1lo25

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.

GitHub Link:
https://github.com/M1lo25/CS50Cybersecurity