{"vulnerability": "CVE-2024-12908", "sightings": [{"uuid": "f3a5998e-19af-448b-8761-834ac29c00fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12908", "type": "seen", "source": "https://t.me/cvedetector/13687", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12908 - Delinea Secret Server Regular Expression Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12908 \nPublished : Dec. 26, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version\u00a06.0.3.26)\u00a0where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a\u00a0remote attacker may be able to convince a user to visit a malicious web-page, or open a  \nmalicious document which could trigger the vulnerable handler, allowing them to execute  \narbitrary code on the user's machine.\u00a0Delinea added additional validation that the downloaded installer's batch file was in the expected format. \nSeverity: 6.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T18:14:44.000000Z"}, {"uuid": "0e0d95b9-b231-4df8-a78e-24f115121074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12908", "type": "seen", "source": "https://bsky.app/profile/amberwolfsec.bsky.social/post/3lefcrn2uec2k", "content": "", "creation_timestamp": "2024-12-28T20:11:32.704489Z"}, {"uuid": "b3134bb7-bb1e-4e5c-985f-20661ee2e068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12908", "type": "seen", "source": "https://t.me/ZeroDay_ru/370", "content": "#exploit\n1. CVE-2024-3393:\nPalo Alto Networks PAN-OS Malicious DNS Packet Vulnerability (DoS)\n\n2. CVE-2024-12908:\nDelinea Protocol Handler - RCE via Update Process\n\n3. CVE-2024-53677:\nUnrestricted Upload of File with Dangerous Type and RCE in Apache Struts\n\n4. CVE-2021-44967:\nLimeSurvey &lt;=5.2 - RCE\n\n5. CVE-2024-47575:\nFortinet FortiManager Missing Authentication", "creation_timestamp": "2025-01-06T13:23:51.000000Z"}, {"uuid": "42593b67-e806-4f4f-beab-8de60bcbec4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12908", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11647", "content": "#exploit\n1. CVE-2024-3393:\nPalo Alto Networks PAN-OS Malicious DNS Packet Vulnerability (DoS)\n\n2. CVE-2024-12908:\nDelinea Protocol Handler - RCE via Update Process\n\n3. CVE-2024-53677:\nUnrestricted Upload of File with Dangerous Type and RCE in Apache Struts\n\n4. CVE-2021-44967:\nLimeSurvey &lt;=5.2 - RCE\n\n5. CVE-2024-47575:\nFortinet FortiManager Missing Authentication", "creation_timestamp": "2025-01-06T15:36:02.000000Z"}, {"uuid": "6a07a527-c17e-4952-a936-f70654752ae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12908", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/313", "content": "https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/\n\nDelinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908)\n#\u5206\u6790", "creation_timestamp": "2025-01-13T09:16:53.000000Z"}, {"uuid": "8ce8f15e-16af-4834-a3ea-a7894290d09b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-12908", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113719903362852151", "content": "", "creation_timestamp": "2024-12-26T15:46:58.198290Z"}, {"uuid": "9223f4c1-e191-4de7-aae3-d646ed4f02a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12908", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/269", "content": "https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/\n\nDelinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908)\n#\u5206\u6790", "creation_timestamp": "2024-12-27T18:51:16.000000Z"}]}