{"vulnerability": "CVE-2020-11108", "sightings": [{"uuid": "d56aa332-e522-4039-8d79-cab8e2d23b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/749", "content": "\u0422\u0443\u0442 \u043f\u043e\u0434\u043f\u0438\u0441\u0447\u0438\u043a \u043f\u043e\u0434\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u043e\u0445\u043e\u0436\u0435 \u0440\u0435\u043b\u0438\u0437 Pi-hole 5.0 \u0431\u044b\u043b \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c, \u043d\u043e \u0438 \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d\u043d\u044b\u043c :)\n\n\u0412 Pi-hole 4.4 \u0438 \u043d\u0438\u0436\u0435 \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043d\u0430 \u0434\u043d\u044f\u0445 \u0431\u044b\u043b\u0438 \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c RCE \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u0443\u0436\u0435 \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0435\u043c, \u043a\u0442\u043e \u0443\u0436\u0435 \u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f Pi-hole \u043d\u0430\u0434\u043e \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f (\u044f \u0443\u0436\u0435).\n\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/\nhttps://www.exploit-db.com/exploits/48442\nhttps://www.exploit-db.com/exploits/48443", "creation_timestamp": "2020-05-11T17:21:08.000000Z"}, {"uuid": "30c19cb2-bfd5-4455-8eed-1d0330213455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48491", "content": "", "creation_timestamp": "2020-05-19T00:00:00.000000Z"}, {"uuid": "a2aa2667-2dc0-4fc6-8fc1-e9cf55ee5e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "a412e44d-2d41-4792-b2f2-20b7e0558a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:21.000000Z"}, {"uuid": "a0a1dd5e-cf67-4653-a930-777fd3e06cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1117", "content": "#exploit\n1. CVE-2020-5837:\nSymantec Endpoint Protection 14.2 - EoP\nhttps://labs.redyops.com/index.php/2020/04/27/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write/\n]-&gt; SEP 14.2 Arbitrary Write Exploit:\nhttps://github.com/RedyOpsResearchLabs/SEP-14.2-Arbitrary-Write\n\n2. CVE-2020-11108:\nPi-hole &lt;4.4 - RCE + LPE\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/\n]-&gt; PoC: https://github.com/frichetten/CVE-2020-11108-PoC", "creation_timestamp": "2024-10-23T17:00:50.000000Z"}, {"uuid": "567d24ba-475e-40b5-9015-ba4a6efabdfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48519", "content": "", "creation_timestamp": "2020-05-26T00:00:00.000000Z"}, {"uuid": "ce232bf2-1c87-457a-9d4e-e2b6e6d026e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/pihole_blocklist_exec.rb", "content": "", "creation_timestamp": "2020-05-18T12:53:15.000000Z"}, {"uuid": "63f26401-ce2b-4a19-91ad-87a1eb90620e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/822", "content": "Analysis of accidentally found RCE + LPE in Pi-hole v4.4 and below. CVE-2020-11108\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/", "creation_timestamp": "2020-05-12T10:03:03.000000Z"}, {"uuid": "94723d1e-db5f-4ec7-bb17-706ec7897ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6431", "content": "CVE-2020-11108: How I Stumbled into a Pi-hole RCE+LPE\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/", "creation_timestamp": "2020-05-12T14:45:39.000000Z"}]}