{"vulnerability": "CVE-2023-4515", "sightings": [{"uuid": "d83e8576-e6d5-4a4b-a479-695dbe3f7cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45151", "type": "seen", "source": "https://t.me/cibsecurity/72330", "content": "\u203c CVE-2023-45151 \u203c\n\nNextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-16T22:32:05.000000Z"}, {"uuid": "e38f5eea-41cd-4ef2-a909-1d3fbf8598e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45159", "type": "seen", "source": "https://t.me/cibsecurity/71659", "content": "\u203c CVE-2023-45159 \u203c\n\n1E Client installer can perform arbitrary file deletion on protected files.\u00c2\u00a0\u00c2\u00a0A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forces\u00c2\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-05T14:12:35.000000Z"}, {"uuid": "65710cf9-185c-470a-a54c-505e2a57ea3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45151", "type": "seen", "source": "https://t.me/Teamx1945x/1025", "content": "\u203c CVE-2023-45151 \u203c\n\n \u062e\u0627\u062f\u0645 Nextcloud \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 \u0645\u0646\u0635\u0629 \u0633\u062d\u0627\u0628\u064a\u0629 \u0645\u0646\u0632\u0644\u064a\u0629 \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631.  \u0642\u0627\u0645\u062a \u0627\u0644\u0625\u0635\u062f\u0627\u0631\u0627\u062a \u0627\u0644\u0645\u062a\u0623\u062b\u0631\u0629 \u0645\u0646 Nextcloud \u0628\u062a\u062e\u0632\u064a\u0646 \u0631\u0645\u0648\u0632 OAuth2 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0641\u064a \u0646\u0635 \u0639\u0627\u062f\u064a \u0645\u0645\u0627 \u064a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0644\u0630\u064a \u062a\u0645\u0643\u0646 \u0645\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0627\u0644\u062e\u0627\u062f\u0645 \u0628\u0631\u0641\u0639 \u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a\u0647.  \u062a\u0645\u062a \u0645\u0639\u0627\u0644\u062c\u0629 \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u0648\u0646\u0648\u0635\u064a \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0628\u062a\u0631\u0642\u064a\u0629 \u062e\u0627\u062f\u0645 Nextcloud \u0625\u0644\u0649 \u0627\u0644\u0625\u0635\u062f\u0627\u0631 25.0.8 \u0623\u0648 26.0.3 \u0623\u0648 27.0.1.  \u0644\u0627 \u062a\u0648\u062c\u062f \u0623\u064a\u0629 \u062d\u0644\u0648\u0644 \u0645\u0639\u0631\u0648\u0641\u0629 \u0644\u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629.\n\n \u0639\u0628\u0631 \"\u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u0648\u0637\u0646\u064a\u0629\".", "creation_timestamp": "2024-03-29T18:27:12.000000Z"}, {"uuid": "cc476ac1-810e-430a-b777-a67bd7c0bc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45151", "type": "seen", "source": "Telegram/FBJ4AgzGy5SfCGDDUdBl8JEiRe8ngQx4awSGfWHbJCy0_g", "content": "", "creation_timestamp": "2023-10-28T14:57:36.000000Z"}, {"uuid": "336ed0cf-6ef7-4bf7-a518-7d92b08f282a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45152", "type": "seen", "source": "https://t.me/arpsyndicate/2643", "content": "#ExploitObserverAlert\n\nCVE-2023-45152\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-45152. Engelsystem is a shift planning system for chaos events. A Blind SSRF in the \"Import schedule\" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 1.4\nNVD-ES: 0.8", "creation_timestamp": "2024-01-08T13:22:11.000000Z"}, {"uuid": "d2988721-5aec-41ba-ab60-ee1c018ee44c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45152", "type": "seen", "source": "https://t.me/cibsecurity/72392", "content": "\u203c CVE-2023-45152 \u203c\n\nEngelsystem is a shift planning system for chaos events. A Blind SSRF in the \"Import schedule\" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T07:32:29.000000Z"}, {"uuid": "a543bdf1-ed25-4f84-845f-3019d66b6a00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45158", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9327", "content": "#exploit\n1. CVE-2023-45158:\nweb2py notifySendHandler os command injection\nhttps://github.com/Evan-Zhangyf/CVE-2023-45158\n\n2. CVE-2021-36393:\nTime-based blind SQL injection on Moodle platforms\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit#cve-2021-36393-exploit\n\n3. The Blooket Redirect exploit\nhttps://github.com/VillainsRule/BlooketRedirect", "creation_timestamp": "2024-04-19T11:38:13.000000Z"}, {"uuid": "57b09f25-399b-4705-8b11-9e3aef6efa61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45158", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1635", "content": "#exploit\n1. CVE-2023-45158:\nweb2py notifySendHandler os command injection\nhttps://github.com/Evan-Zhangyf/CVE-2023-45158\n\n2. CVE-2021-36393:\nTime-based blind SQL injection on Moodle platforms\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit#cve-2021-36393-exploit\n\n3. The Blooket Redirect exploit\nhttps://github.com/VillainsRule/BlooketRedirect", "creation_timestamp": "2024-08-16T08:43:29.000000Z"}, {"uuid": "c706aea9-0717-4845-ac2f-b0320dd0e0b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45159", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16957", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45159\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: 1E Client installer can perform arbitrary file deletion on protected files.\u00a0\u00a0\n\nA non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. \n\nA hotfix is available from the 1E support portal that forces\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\nfor v8.1 use hotfix Q23097\nfor v8.4 use hotfix Q23105\nfor v9.0 use hotfix Q23115\n\nfor SaaS customers, use 1EClient v23.7 plus hotfix Q23121\n\ud83d\udccf Published: 2023-10-05T10:11:20.065Z\n\ud83d\udccf Modified: 2025-05-20T08:25:59.533Z\n\ud83d\udd17 References:\n1. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2001/", "creation_timestamp": "2025-05-20T08:39:55.000000Z"}, {"uuid": "a14359b6-dc78-4fd0-a4c5-b1aa42c6cc8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45150", "type": "seen", "source": "https://t.me/cibsecurity/72371", "content": "\u203c CVE-2023-45150 \u203c\n\nNextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T00:38:20.000000Z"}]}