{"vulnerability": "CVE-2024-2457", "sightings": [{"uuid": "0f1018b8-cae3-45cf-af18-809c773e7b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24570", "type": "seen", "source": "https://t.me/ctinow/192522", "content": "https://ift.tt/35bUWzA\nCVE-2024-24570 | Statamic CMS up to 3.4.16/4.45.x cross site scripting (GHSA-vqxq-hvxw-9mv9)", "creation_timestamp": "2024-02-24T10:11:19.000000Z"}, {"uuid": "60e80e43-0482-4942-aca5-4e51b0d085f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24572", "type": "seen", "source": "https://t.me/ctinow/180968", "content": "https://ift.tt/69BIv8n\nCVE-2024-24572 Exploit", "creation_timestamp": "2024-02-07T21:17:13.000000Z"}, {"uuid": "6a7d706b-a3b4-47bd-a755-8dbcbf175e5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24571", "type": "seen", "source": "https://t.me/ctinow/180966", "content": "https://ift.tt/q6tFr0N\nCVE-2024-24571 Exploit", "creation_timestamp": "2024-02-07T21:17:10.000000Z"}, {"uuid": "df187239-79d9-4ac8-aa2e-8b2e7794d9b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24577", "type": "seen", "source": "https://t.me/ctinow/180408", "content": "https://ift.tt/wBWZXkR\nCVE-2024-24577", "creation_timestamp": "2024-02-06T23:31:40.000000Z"}, {"uuid": "e3d855f4-3477-4160-9bce-dd68a318483d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24575", "type": "seen", "source": "https://t.me/ctinow/180407", "content": "https://ift.tt/TyIPcfF\nCVE-2024-24575", "creation_timestamp": "2024-02-06T23:31:39.000000Z"}, {"uuid": "56a47bcc-56ea-4271-943a-eb924693ff04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24573", "type": "seen", "source": "https://t.me/ctinow/180970", "content": "https://ift.tt/XeWfU8y\nCVE-2024-24573 Exploit", "creation_timestamp": "2024-02-07T21:17:15.000000Z"}, {"uuid": "8a932187-71a7-45fa-adad-8aabe5923922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24579", "type": "seen", "source": "https://t.me/ctinow/190862", "content": "https://ift.tt/hFYpgam\nCVE-2024-24579 | anchore stereoscope prior 0.0.1 UntarToDirectory path traversal (GHSA-hpxr-w9w7-g4gv)", "creation_timestamp": "2024-02-22T16:11:31.000000Z"}, {"uuid": "904d582b-f5f3-4592-b0d4-12e8e42a4ad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24577", "type": "seen", "source": "https://t.me/ctinow/180470", "content": "https://ift.tt/pTUPyF7\nCVE-2024-24577", "creation_timestamp": "2024-02-07T02:11:32.000000Z"}, {"uuid": "65179ae8-5c65-4735-af5c-bd401d6a9c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24575", "type": "seen", "source": "https://t.me/ctinow/180462", "content": "https://ift.tt/f81BLmd\nCVE-2024-24575", "creation_timestamp": "2024-02-07T01:41:15.000000Z"}, {"uuid": "ba08b522-cf45-4758-8d87-f2a7d66a37ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24574", "type": "seen", "source": "https://t.me/ctinow/179549", "content": "https://ift.tt/ZmN3O2j\nCVE-2024-24574", "creation_timestamp": "2024-02-05T22:32:01.000000Z"}, {"uuid": "b6dcf446-ef31-4ff3-ab59-8329c907bf03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24574", "type": "seen", "source": "https://t.me/ctinow/183559", "content": "https://ift.tt/0dzIfyt\nCVE-2024-24574 Exploit", "creation_timestamp": "2024-02-13T02:16:44.000000Z"}, {"uuid": "c7d8ac98-0922-4f9f-bfa4-da5be1dc0eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24570", "type": "seen", "source": "https://t.me/ctinow/177722", "content": "https://ift.tt/rXE9JA8\nCVE-2024-24570", "creation_timestamp": "2024-02-01T18:21:52.000000Z"}, {"uuid": "b7e39fcc-beed-43ce-9c39-3eaa44b42d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24572", "type": "seen", "source": "https://t.me/ctinow/177213", "content": "https://ift.tt/6wTBAK0\nCVE-2024-24572", "creation_timestamp": "2024-02-01T00:21:36.000000Z"}, {"uuid": "445efcb6-4b7a-4a84-9a19-3323160a9481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24571", "type": "seen", "source": "https://t.me/ctinow/177212", "content": "https://ift.tt/RuI1MaL\nCVE-2024-24571", "creation_timestamp": "2024-02-01T00:21:35.000000Z"}, {"uuid": "00ff84b8-b91a-46fd-ae56-e57c0ddc5cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24573", "type": "seen", "source": "https://t.me/ctinow/177214", "content": "https://ift.tt/uGqJjUr\nCVE-2024-24573", "creation_timestamp": "2024-02-01T00:21:37.000000Z"}, {"uuid": "ba6ced94-154f-4c53-886a-c5870f403267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24579", "type": "seen", "source": "https://t.me/ctinow/176963", "content": "https://ift.tt/x0GEphJ\nCVE-2024-24579", "creation_timestamp": "2024-01-31T18:22:21.000000Z"}, {"uuid": "52e63e02-d1e6-49b4-9f86-4eaf785362cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/theninjaway1337/1524", "content": "Critical Vulnerability in Rust on Windows\n\nThe vulnerability, identified as\u00a0CVE-2024-24576\u00a0with a CVSS score of 10, stems from improper sanitisation of command-line arguments which could be manipulated to execute arbitrary commands. This issue affects all Rust versions prior to 1.77.2 on Windows if a program's code or one of its dependencies invokes and executes batch files with untrusted arguments [1].\n\nhttps://cert.europa.eu/publications/security-advisories/2024-035/", "creation_timestamp": "2024-04-15T00:16:46.000000Z"}, {"uuid": "b3bd1e19-1ef9-447f-b872-086d1f2d6d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2301", "content": "https://github.com/frostb1ten/CVE-2024-24576-PoC\n\nCVE-2024-24576 PoC\n#github #poc", "creation_timestamp": "2024-04-12T09:14:14.000000Z"}, {"uuid": "58a05d40-de62-477e-88b3-fda87ab6afb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2478", "content": "https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows\n\nCVE-2024-24576\n#\u5206\u6790", "creation_timestamp": "2024-06-25T04:08:14.000000Z"}, {"uuid": "9f43b87e-d185-455b-8f15-0a059fb5a293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://gist.github.com/pimann2000/288ac6a09c3870e21ca83681cdefa2ff", "content": "", "creation_timestamp": "2025-08-10T19:17:27.000000Z"}, {"uuid": "7c3a0817-fb76-4d6c-b6e3-94139f32d4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24578", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/raspberrymatic_unauth_rce_cve_2024_24578.rb", "content": "", "creation_timestamp": "2025-02-21T01:30:23.000000Z"}, {"uuid": "5b94891e-c14b-4d51-b798-e37344001999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/itsec_news/4302", "content": "\u200b\u26a1\ufe0fCVE-2024-24576: Rust \u0441\u0442\u0430\u043b \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0430 Windows\n\n\ud83d\udcac \u0412 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Rust \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 Windows.\n\nCVE-2024-24576 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 10) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u043a\u043e\u043c\u0430\u043d\u0434 \u0438 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u041e\u0421, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u0410\u0442\u0430\u043a\u0430 \u043e\u0431\u043b\u0430\u0434\u0430\u0435\u0442 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f.\n\n\u0413\u0440\u0443\u043f\u043f\u0430 \u043f\u043e \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e \u043d\u0430 \u0443\u0433\u0440\u043e\u0437\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Rust \u0431\u044b\u043b\u0430 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0430 \u043e \u0442\u043e\u043c, \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u0430\u044f \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 Rust \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u0434\u043e\u043b\u0436\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u044b \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 \u043f\u0430\u043a\u0435\u0442\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 (\u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f\u043c\u0438 bat \u0438 cmd) \u0432 Windows \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e Command API.\n\n\u041a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u044e\u0449\u0438\u0439 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u044b \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430, \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0435, \u043e\u0431\u0445\u043e\u0434\u044f \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435. \u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u0430\u043a\u0435\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043d\u0430 Windows \u0441 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u043c\u0438 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438. \u0414\u0440\u0443\u0433\u0438\u0435 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b \u0438\u043b\u0438 \u0441\u043b\u0443\u0447\u0430\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0440\u0438\u0441\u043a\u0443.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Rust \u0434\u043e 1.77.2 \u043d\u0430 Windows, \u0435\u0441\u043b\u0438 \u043a\u043e\u0434 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438\u043b\u0438 \u043e\u0434\u043d\u0430 \u0438\u0437 \u0435\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0444\u0430\u0439\u043b\u044b \u043f\u0430\u043a\u0435\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u043c\u0438 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438.\n\n\u041a\u043e\u043c\u0430\u043d\u0434\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Rust \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u043b\u0430\u0441\u044c \u0441 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 cmd.exe \u0438 \u043d\u0435 \u0441\u043c\u043e\u0433\u043b\u0430 \u043d\u0430\u0439\u0442\u0438 \u0440\u0435\u0448\u0435\u043d\u0438\u0435, \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u0443\u044e\u0449\u0435\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u044b \u0432\u043e \u0432\u0441\u0435\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0431\u044b\u043b\u0430 \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0430 \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d Command API. \u0415\u0441\u043b\u0438 Command API \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442 \u043f\u0440\u0438 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430, \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u0435\u0442\u0441\u044f \u043e\u0448\u0438\u0431\u043a\u0430 InvalidInput.\n\n\u0418\u043d\u0436\u0435\u043d\u0435\u0440 \u0438\u0437 Flatt Security, \u0420\u0451\u0442\u0430\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438 \u043d\u0430\u0437\u0432\u0430\u043b \u0435\u0435 BatBadBut, \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043e\u043d\u0430 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u044f\u0437\u044b\u043a\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \u041e\u0434\u043d\u0430\u043a\u043e \u043d\u0435 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0438\u0437 \u043d\u0438\u0445 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\nErlang (\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438);\nGo (\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438);\nHaskell (\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435);\nJava (\u043d\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e);\nNode.js (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043a\u043e\u0440\u043e \u0431\u0443\u0434\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e);\nPHP (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043a\u043e\u0440\u043e \u0431\u0443\u0434\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e);\nPython (\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438);\nRuby (\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438).\n\n\u0420\u0451\u0442\u0430\u043a \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u043d\u0435\u043f\u0440\u0435\u0434\u0432\u0438\u0434\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0430\u043a\u0435\u0442\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u0435\u0440\u0435\u043c\u0435\u0441\u0442\u0438\u0442\u044c \u0438\u0445 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0435\u043d \u0432 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u0443\u044e \u0441\u0440\u0435\u0434\u044b PATH. \u042d\u0442\u043e \u043f\u043e\u043c\u043e\u0436\u0435\u0442 \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u0438\u0445 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0435\u0437 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u044f \u043f\u043e\u043b\u043d\u043e\u0433\u043e \u043f\u0443\u0442\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-04-10T10:16:47.000000Z"}, {"uuid": "2a0af10a-cf0e-4027-921f-3acfd093c786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7034", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis is a simple demo for the BadBatBut vulnerability CVE-2024-24576\nURL\uff1ahttps://github.com/corysabol/batbadbut-demo\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-12T23:38:25.000000Z"}, {"uuid": "87276e4b-8309-4b07-b9e2-8152396b1cfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7048", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aQuick example of CVE-2024-24576 written in java. Java team announced they are not going to patch this vournabiliti and  good :D\nURL\uff1ahttps://github.com/jakbyjakub/java-CVE-2024-24576-exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-14T14:48:51.000000Z"}, {"uuid": "bddfe32f-7ecc-4a26-bbcb-fe27c802714e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7044", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24576 PoC in Julia\nURL\uff1ahttps://github.com/lpn/CVE-2024-24576.jl\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-14T05:04:58.000000Z"}, {"uuid": "38228f42-576a-4dcc-a0de-92a14d3fea60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7042", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1ahttps://nvd.nist.gov/vuln/detail/CVE-2024-24576\nURL\uff1ahttps://github.com/mishalhossin/CVE-2024-24576-PoC-Python\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-14T02:32:15.000000Z"}, {"uuid": "29cfed8a-76eb-4a79-8f2f-2087cf4a8805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/hydral0gs/2406", "content": "https://github.com/aydinnyunus/CVE-2024-24576-Exploit\n\nPoC", "creation_timestamp": "2024-04-10T17:10:24.000000Z"}, {"uuid": "f3322f06-ff02-44fe-8d11-5d88863575f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/cvedetector/4816", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43402 - \"Rust std::process::Command Windows Batch File Escaping Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2024-43402 \nPublished : Sept. 4, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Rust is a programming language. The fix for CVE-2024-24576, where `std::process::Command` incorrectly escaped arguments when invoking batch files on Windows, was incomplete. Prior to Rust version 1.81.0, it was possible to bypass the fix when the batch file name had trailing whitespace or periods (which are ignored and stripped by Windows). To determine whether to apply the `cmd.exe` escaping rules, the original fix for the vulnerability checked whether the command name ended with `.bat` or `.cmd`. At the time that seemed enough, as we refuse to invoke batch scripts with no file extension. Windows removes trailing whitespace and periods when parsing file paths. For example, `.bat. .` is interpreted by Windows as `.bat`, but the original fix didn't check for that. Affected users who are using Rust 1.77.2 or greater can remove the trailing whitespace (ASCII 0x20) and trailing periods (ASCII 0x2E) from the batch file name to bypass the incomplete fix and enable the mitigations. Users are affected if their code or one of their dependencies invoke a batch script on Windows with trailing whitespace or trailing periods in the name, and pass untrusted arguments to it. Rust 1.81.0 will update the standard library to apply the CVE-2024-24576 mitigations to all batch files invocations, regardless of the trailing chars in the file name. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T19:25:39.000000Z"}, {"uuid": "eaad1811-b22e-43ee-ae25-58a360f1c1ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "Telegram/LdPv_F9liB72pVwvOH0LiV90Zx_FNXzYfSD2v9gYUlVH7Q", "content": "", "creation_timestamp": "2024-04-12T02:30:10.000000Z"}, {"uuid": "85334fbc-c47f-44cf-979c-d0f9212f3202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/5348", "content": "The Hacker News\nCritical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks\n\nA critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks.\nThe vulnerability, tracked as&nbsp;CVE-2024-24576, has a CVSS score of 10.0, indicating maximum severity. That said, it only impacts scenarios where batch files are invoked on Windows with untrusted arguments.\n\"The Rust standard library did not properly escape", "creation_timestamp": "2024-04-10T07:29:36.000000Z"}, {"uuid": "eafdb74f-c057-4d83-93d0-65951b7fe23d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/arpsyndicate/4488", "content": "#ExploitObserverAlert\n\nCVE-2024-24576\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-24576. Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected.  The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument.  On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted.  One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution.  Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an [`InvalidInput`][4] error when it cannot safely escape an argument. This error will be emitted when spawning the process.  The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.\n\nFIRST-EPSS: 0.000440000", "creation_timestamp": "2024-04-11T09:09:09.000000Z"}, {"uuid": "c04df481-e887-4515-871d-72c718115d4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1008", "content": "The Hacker News\nCritical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks\n\nA critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks.\nThe vulnerability, tracked as&nbsp;CVE-2024-24576, has a CVSS score of 10.0, indicating maximum severity. That said, it only impacts scenarios where batch files are invoked on Windows with untrusted arguments.\n\"The Rust standard library did not properly escape", "creation_timestamp": "2024-04-10T07:29:36.000000Z"}, {"uuid": "fe2b484e-d030-40f9-88c9-cdeff80c69b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/CyberSecurityIL/42459", "content": "\u05d0\u05e4\u05e8\u05d5\u05e4\u05d5 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea, \u05de\u05e6\u05e8\u05e3 \u05dc\u05db\u05dd \u05de\u05d9\u05d3\u05e2 \u05e2\u05dc \u05db\u05de\u05d4 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d1\u05de\u05d5\u05e6\u05e8\u05d9\u05dd \u05e9\u05d5\u05e0\u05d9\u05dd:\n\n- \u05db\u05d7\u05dc\u05e7 \u05de\u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d7\u05d5\u05d3\u05e9\u05d9\u05d9\u05dd \u05e9\u05dc \u05d0\u05e4\u05e8\u05d9\u05dc 2024,  \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05de\u05e4\u05d9\u05e6\u05d4 \u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05e1\u05d5\u05d2\u05e8 2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea Zero Day \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05e1\u05d1\u05d9\u05d1 \u05dc\u05e2\u05d5\u05dc\u05dd -  CVE-2024-26234 \u05d5- CVE-2024-29988\n\n- \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1\u05e1\u05e4\u05e8\u05d9\u05d4 Rust \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (\u05ea\u05e7\u05e3 \u05e8\u05e7 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea Windows) -  CVE-2024-24576.\n\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 \u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05de\u05d3\u05d5\u05e8\u05d2\u05ea 10/10 \u05db\u05e9\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d7\u05dc\u05d4 \u05e2\u05dc Rust standard library \u05dc\u05e4\u05e0\u05d9 \u05d2\u05e8\u05e1\u05d4 1.77.2.\n\n- \u05d7\u05d5\u05e7\u05e8\u05d9\u05dd \u05d7\u05e9\u05e4\u05d5 \u05d0\u05e8\u05d1\u05e2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d1\u05d8\u05dc\u05d5\u05d5\u05d9\u05d6\u05d9\u05d5\u05ea \u05d4\u05d7\u05db\u05de\u05d5\u05ea \u05e9\u05dc LG - \u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e2\u05dc \u05db\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea - \u05db\u05d0\u05df\n\nhttps://t.me/CyberSecurityIL/4978\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-04-10T13:01:14.000000Z"}, {"uuid": "5666afb5-5fd9-412b-866b-940a3857a886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24578", "type": "seen", "source": "https://t.me/ctinow/211028", "content": "https://ift.tt/y4J0QWC\nCVE-2024-24578", "creation_timestamp": "2024-03-18T23:26:26.000000Z"}, {"uuid": "d31269a4-7bc6-431c-8709-eb23c8ec3725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24577", "type": "seen", "source": "https://t.me/ctinow/197663", "content": "https://ift.tt/pNUWmjV\nCVE-2024-24577 | libgit2 up to 1.6.4/1.7.1 src/libgit2/index.c git_index_add heap-based overflow (GHSA-j2v7-4f6v-gpg8)", "creation_timestamp": "2024-03-01T14:46:52.000000Z"}, {"uuid": "a3ec4497-1b2e-44a7-8622-3bd467a58706", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/thehackernews/4797", "content": "\u26a0\ufe0f Attention Developers: A severe vulnerability (CVE-2024-24576) in the Rust standard library could lead to command injection attacks on Windows systems. \n \nhttps://thehackernews.com/2024/04/critical-batbadbut-rust-vulnerability.html \n \nCVSS score of 10.0. Patch any apps using vulnerable Rust versions ASAP!", "creation_timestamp": "2024-04-10T05:09:13.000000Z"}, {"uuid": "6ac3ace7-e3d7-4880-8a2f-cadba744a6d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/xakep_ru/15668", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Rust \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f\u043c \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 Windows\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 BatBadBut \u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-24576 (\u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0435 10 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS), \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0440\u044f\u0434\u0430 \u044f\u0437\u044b\u043a\u043e\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Rust. \u0418\u0437-\u0437\u0430 \u044d\u0442\u043e\u0433\u043e Windows-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043f\u0435\u0440\u0435\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438 \u043d\u0430 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434 \u0438 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432.\n\nhttps://xakep.ru/2024/04/10/batbadbut/", "creation_timestamp": "2024-04-10T21:34:22.000000Z"}, {"uuid": "f08ae015-1686-4b36-bb15-20e4787c59a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/cultofwire/1255", "content": "BatBadBut: You can't securely execute commands on Windows\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 Vulnerability Note Multiple programming languages fail to escape arguments properly in Microsoft Windows \u043e\u0442 \u0430\u0432\u0442\u043e\u0440\u0430.\n\nBatBadBut \u2014 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Windows, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043a\u043e\u0441\u0432\u0435\u043d\u043d\u043e \u0437\u0430\u0432\u0438\u0441\u044f\u0442 \u043e\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 CreateProcess, \u043f\u0440\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u0439.\n\nCreateProcess() \u043d\u0435\u044f\u0432\u043d\u043e \u043f\u043e\u0440\u043e\u0436\u0434\u0430\u0435\u0442 cmd.exe \u043f\u0440\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043f\u0430\u043a\u0435\u0442\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 (.bat, .cmd \u0438 \u0442. \u0434.), \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0435 \u0443\u043a\u0430\u0437\u0430\u043b\u043e \u0438\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0435.\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e cmd.exe \u0438\u043c\u0435\u0435\u0442 \u0441\u043b\u043e\u0436\u043d\u044b\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0440\u0430\u0437\u0431\u043e\u0440\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u044b\u0445 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u0430 \u0441\u0440\u0435\u0434\u044b \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u044f\u0437\u044b\u043a\u043e\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u044b\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u044b.\n\u0418\u0437-\u0437\u0430 \u044d\u0442\u043e\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0435\u0441\u043b\u0438 \u043a\u0442\u043e-\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0447\u0430\u0441\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u044b\u0445 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u043f\u0430\u043a\u0435\u0442\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430.\n\n\u0418\u043c\u043f\u0430\u043a\u0442:\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b. \u041f\u043e\u043b\u043d\u043e\u0435 \u0432\u043b\u0438\u044f\u043d\u0438\u0435 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0432\u0438\u0441\u0438\u0442 \u043e\u0442 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u044f\u0437\u044b\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u043b\u0438 \u0442\u0430\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043c\u043e\u0434\u0443\u043b\u044c\n\n\u041a\u0430\u043a\u0438\u0435 \u044f\u0437\u044b\u043a\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442:\n- Haskell\n- Node.js\n- Rust\n- PHP\n\n\u041d\u043e \u0430\u0432\u0442\u043e\u0440 \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u044d\u0442\u043e \u0442\u0430\u043a \u0436\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u043e \u043a Erlang, Go, Java, Python \u0438 Ruby.\n\n\u0421\u043f\u0438\u0441\u043e\u043a CVE:\nCVE-2024-1874\nCVE-2024-22423\nCVE-2024-24576\nCVE-2024-3566", "creation_timestamp": "2024-04-15T15:02:52.000000Z"}, {"uuid": "56df4655-ff42-4fa8-99e2-7fc839878700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2288", "content": "https://github.com/aydinnyunus/CVE-2024-24576-Exploit\n\nCVE-2024-24576 Proof of Concept\n#github #exploit", "creation_timestamp": "2024-04-10T17:01:25.000000Z"}, {"uuid": "e43c4789-21f5-4356-b04b-42a04c55a4ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2294", "content": "https://github.com/foxoman/CVE-2024-24576-PoC---Nim?tab=readme-ov-file\n\nCVE-2024-24576 PoC for Nim Lang\n#github", "creation_timestamp": "2024-04-11T15:36:04.000000Z"}, {"uuid": "f240d698-5139-4d05-a9bd-c57c11781265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24578", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T02:37:08.000000Z"}, {"uuid": "49396320-3500-44f2-8be2-2040eb6bbe77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-24576", "type": "seen", "source": "https://gist.github.com/adhn9x/7c1aad724b7f0d13efaaebccb23a31be", "content": "", "creation_timestamp": "2025-04-17T03:22:19.000000Z"}, {"uuid": "dac697e6-4614-496c-8f42-3cd4424e0241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://bsky.app/profile/hackernoon.com/post/3luj6uiiigu2z", "content": "", "creation_timestamp": "2025-07-21T23:55:14.571073Z"}, {"uuid": "1c663557-44bf-4510-bca1-37d8febf02fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mdtsq7cvcc2q", "content": "", "creation_timestamp": "2026-02-02T02:35:17.264893Z"}, {"uuid": "a0462e0a-dd64-442b-8c27-d22d1f4a05b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "Telegram/thEY8fKG_ecUz3R94I0eNWcRZ9hyij0kGyZ4uuqLzh7SsPY", "content": "", "creation_timestamp": "2024-04-10T05:39:22.000000Z"}, {"uuid": "d607a71c-575b-4431-9d90-e464f94ffd5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6999", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExample of CVE-2024-24576 use case.\nURL\uff1ahttps://github.com/frostb1ten/CVE-2024-24576-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-09T21:43:41.000000Z"}, {"uuid": "36207327-3a3a-49c9-a3cb-4e593982c3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "Telegram/m0zbq7B5dqSJ8bXM3yMJH3pWg-0bi-7XK638Eih9rExXkw", "content": "", "creation_timestamp": "2024-04-10T07:22:28.000000Z"}, {"uuid": "56b51fa7-b9f7-4b10-abc9-6087aa78295c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/125014", "content": "\u041c\u0430\u043b\u044e\u0442\u043a\u0430\u043c \u043d\u0430 \u0440\u0430\u0441\u0442\u0435\u0440\u0430\u0445, \u0430\u043b\u044f \u0441\u0430\u043c\u043e\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c \u044f\u0437\u044b\u043a\u0435 \u043f\u043e\u0433\u0440\u043e\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0441\u0442\u043e\u0438\u0442 \u043d\u0430\u043f\u0440\u044f\u0447\u044c \u0441\u0432\u043e\u0438 \u043f\u0435\u0440\u0434\u0430\u0447\u043a\u0438 \u0438 \u0437\u0430\u043f\u0430\u0441\u0442\u0438\u0441\u044c \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u043e\u043c.  \u0412\u0435\u0434\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043f\u043a \u0438 \u0432\u044b\u043a\u0430\u0447\u0430\u0442\u044c \u0432\u0441\u0435 \u0431\u0438\u0442\u043a\u043e\u0438\u043d\u044b \u0438\u043b\u0438 \u0442\u043e\u043d\u0447\u0438\u043a\u0438. \nPoC \nhttps://github.com/aydinnyunus/CVE-2024-24576-Exploit", "creation_timestamp": "2024-04-11T09:18:48.000000Z"}, {"uuid": "e289068d-407d-4cca-95e1-f86cc3d89f4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/KomunitiSiber/1756", "content": "Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks\nhttps://thehackernews.com/2024/04/critical-batbadbut-rust-vulnerability.html\n\nA critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks.\nThe vulnerability, tracked as\u00a0CVE-2024-24576, has a CVSS score of 10.0, indicating maximum severity. That said, it only impacts scenarios where batch files are invoked on Windows with untrusted arguments.\n\"The Rust standard library did not properly escape", "creation_timestamp": "2024-04-10T06:04:20.000000Z"}, {"uuid": "92bbf641-1749-4203-8010-9b75a4411a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "Telegram/7WH93zHjr-hpdcfM73ZQ8mCPW81TnJSeouQ9wcyzpJdjCw", "content": "", "creation_timestamp": "2024-04-10T17:10:24.000000Z"}, {"uuid": "cd8a631a-882d-4565-93c6-960919240fb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24578", "type": "seen", "source": "https://t.me/ctinow/211036", "content": "https://ift.tt/y4J0QWC\nCVE-2024-24578", "creation_timestamp": "2024-03-18T23:26:35.000000Z"}, {"uuid": "67f1b6ea-91d9-49e3-8066-2118ca720b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24571", "type": "seen", "source": "https://t.me/ctinow/191178", "content": "https://ift.tt/5W2KErs\nCVE-2024-24571 | WillyXJ facileManager up to 4.5.0 cross site scripting (GHSA-h7w3-xv88-2xqj)", "creation_timestamp": "2024-02-22T21:21:46.000000Z"}, {"uuid": "55b27adf-de5f-437b-8840-ef71458713c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24574", "type": "seen", "source": "https://t.me/ctinow/196425", "content": "https://ift.tt/b2iYgZf\nCVE-2024-24574 | thorsten phpMyFAQ up to 3.2.4 Echo attachments.php filename cross site scripting (GHSA-7m8g-fprr-47fx)", "creation_timestamp": "2024-02-29T09:56:55.000000Z"}, {"uuid": "9f12fafd-7f44-45be-b344-0243601f3103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2344", "content": "https://programlife.net/2024/04/14/cve-2024-24576-rust-command-injection-vulnerability/\n\nCVE-2024-24576 Windows \u4e0b\u591a\u8bed\u8a00\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u5206\u6790\n#\u5206\u6790", "creation_timestamp": "2024-04-19T12:31:38.000000Z"}, {"uuid": "e0071b7f-d9c6-4868-b160-34b862577f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10362", "content": "#exploit\n1. CVE-2024-29204:\nIvanti Avalanche WLAvalancheService.exe Unauthenticated Heap-based Buffer Overflow\nhttps://www.tenable.com/security/research/tra-2024-10\n\n2. CVE-2024-24576:\nRust Library for Windows RCE\nhttps://programlife.net/2024/04/14/cve-2024-24576-rust-command-injection-vulnerability", "creation_timestamp": "2024-04-20T00:32:22.000000Z"}, {"uuid": "c3efa0d9-7b8a-43f3-89b6-9feb193184a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3luglqb4k7k2a", "content": "", "creation_timestamp": "2025-07-20T23:07:32.316711Z"}, {"uuid": "8b27ce8e-4613-470d-b08c-189dc8fc887e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24578", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "68f5ec1b-7123-44e6-814b-777893d2f3c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/Logovo_Sphinxa/75", "content": "\u0427\u0442\u043e \u043d\u0435 \u0434\u0435\u043d\u044c, \u0442\u043e \u043d\u043e\u0432\u043e\u0435 CVE. \u041d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043e\u0447\u043a\u043e \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043d\u0430\u043f\u0440\u044f\u0447\u044c \u0440\u0430\u0441\u0442\u0435\u0440\u0430\u043c. CVE-2024-24576 \u043d\u0430\u0431\u0438\u0440\u0430\u0435\u0442 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0435 10 \u0431\u0430\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS. \u041d\u0443 \u043f\u0438\u0437\u0434\u0435\u0446, \u0447\u0442\u043e \u043c\u043e\u0433\u0443 \u0441\u043a\u0430\u0437\u0430\u0442\u044c", "creation_timestamp": "2024-04-10T19:49:19.000000Z"}, {"uuid": "ff0fe36a-f74d-48d3-a7e8-fb646ba91bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6998", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExample of CVE-2024-24576 use case.\nURL\uff1ahttps://github.com/frostb1ten/CVE-2024-24576\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-09T21:18:40.000000Z"}, {"uuid": "6914b106-984c-44ff-ab71-cd51ce52c5a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7017", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24576 PoC for Nim Lang\nURL\uff1ahttps://github.com/foxoman/CVE-2024-24576-PoC---Nim\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-11T10:26:21.000000Z"}, {"uuid": "b5666c01-86f1-4910-8aa7-a161d4ca04df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7012", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24576 Proof of Concept\nURL\uff1ahttps://github.com/aydinnyunus/CVE-2024-24576-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-10T14:13:09.000000Z"}, {"uuid": "baf2ad7a-845c-4818-932a-c335f1274679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7132", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for CVE-2024-24576 vulnerability \\\"BatBadBut\\\"\nURL\uff1ahttps://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-21T13:53:27.000000Z"}, {"uuid": "b8ff5fbf-9e9d-4dcf-bdc6-eab2fd381ddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7131", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for CVE-2024-24576 vulnerability \\\"BatBadBut\\\"\nURL\uff1ahttps://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut-\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-21T13:44:48.000000Z"}, {"uuid": "da9048d2-587e-4f47-8baa-ba5ddbde39b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "Telegram/g18kN5dwDc_-tfHIg7SDCFJ2r0EFGLJI9ws4ZMxxR4xcmg", "content": "", "creation_timestamp": "2024-04-10T07:29:34.000000Z"}, {"uuid": "ffd32811-5b5e-4bdd-955a-32c7941544cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/arpsyndicate/4645", "content": "#ExploitObserverAlert\n\nCVE-2024-24576\n\nDESCRIPTION: Exploit Observer has 67 entries in 13 file formats related to CVE-2024-24576. Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected.  The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument.  On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted.  One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution.  Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process.  The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.\n\nFIRST-EPSS: 0.000440000\nARPS-EXPLOITABILITY: 0.6898125", "creation_timestamp": "2024-04-13T12:13:48.000000Z"}, {"uuid": "af9f89c3-1783-48a8-81bd-4132e9ab0bd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "published-proof-of-concept", "source": "Telegram/q8-8lFQU072zru-rMBlyiIK0sgFGV2WTgopjLO7kV5z44Ag", "content": "", "creation_timestamp": "2024-04-10T18:09:00.000000Z"}]}