Subscribe via feed.
Archive for June, 2022

Confluence OGNL Injection Remote Code Execution

Posted by deepcore under exploit (No Respond)

Confluence suffers from a pre-authentication remote code execution vulnerability that is leveraged via OGNL injection. All 7.4.17 versions before 7.18.1 are affected.

Through The Wire CVE-2022-26134 Confluence Proof Of Concept

Posted by deepcore under exploit (No Respond)

Through the Wire is a proof of concept exploit for CVE-2022-26134, an OGNL injection vulnerability affecting Atlassian Confluence Server and Data Center versions 7.13.6 LTS and below and versions 7.18.0 “Latest” and below. This was originally a zero-day exploited in-the-wild.

Confluence OGNL Injection Proof Of Concept

Posted by deepcore under exploit (No Respond)

Proof of concept script that exploits the remote code execution vulnerability affecting Atlassian Confluence versions 7.18 and below. The OGNL injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance. All supported versions of Confluence Server and Data Center are affected. Confluence Server and Data Center versions […]

Trojan-Banker.Win32.Banker.agzg MVID-2022-0608 Insecure Permissions

Posted by deepcore under exploit (No Respond)

Trojan-Banker.Win32.Banker.agzg malware suffers from an insecure permissions vulnerability.

Trojan-Banker.Win32.Banbra.cyt MVID-2022-0611 Insecure Permissions

Posted by deepcore under exploit (No Respond)

Trojan-Banker.Win32.Banbra.cyt malware suffers from an insecure permissions vulnerability.

Trojan-Proxy.Win32.Symbab.o MVID-2022-0610 Heap Corruption

Posted by deepcore under exploit (No Respond)

Trojan-Proxy.Win32.Symbab.o malware suffers from a heap corruption vulnerability.

Ransom.Haron MVID-2022-0609 Code Execution

Posted by deepcore under exploit (No Respond)

Haron ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit DLL will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

Backdoor.Win32.Cabrotor.10.d MVID-2022-0612 Remote Command Execution

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Cabrotor.10.d malware suffers from an unauthenticated remote command execution vulnerability.

Microsoft Office Word MSDTJS Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module generates a malicious Microsoft Word document that when loaded, will leverage the remote template feature to fetch an HTML document and then use the ms-msdt scheme to execute PowerShell code.

Microsoft Office Word MSDTJS Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module generates a malicious Microsoft Word document that when loaded, will leverage the remote template feature to fetch an HTML document and then use the ms-msdt scheme to execute PowerShell code.