{"vulnerability": "CVE-2024-38819", "sightings": [{"uuid": "fb472b7d-4865-4b07-9a2d-21f1c7016df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1334", "content": "#GitHub #Tools\n\nMy various vulnerability scripts with notes \n\nhttps://github.com/momika233/loxs-optimized/\n\nComplete list of LPE exploits for Windows (starting from 2023)\n\nhttps://github.com/MzHmO/Exploit-Street\n\nA comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.\n\nhttps://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes\n\nPendingFileRenameOperations + Junctions EDR Disable\n\nhttps://github.com/rad9800/FileRenameJunctionsEDRDisable\n\nCVE-2024-38819: Proof of Concept (PoC)\n\nhttps://github.com/masa42/CVE-2024-38819-POC\n\nBAADTokenBroker\n\nhttps://github.com/secureworks/BAADTokenBroker\n\n#HackersForum", "creation_timestamp": "2024-12-20T03:35:05.000000Z"}, {"uuid": "7c616c28-1392-442c-9632-0b0c1c62889b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/9167", "content": "#GitHub #Tools\n\nMy various vulnerability scripts with notes \n\nhttps://github.com/momika233/loxs-optimized/\n\nComplete list of LPE exploits for Windows (starting from 2023)\n\nhttps://github.com/MzHmO/Exploit-Street\n\nA comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.\n\nhttps://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes\n\nPendingFileRenameOperations + Junctions EDR Disable\n\nhttps://github.com/rad9800/FileRenameJunctionsEDRDisable\n\nCVE-2024-38819: Proof of Concept (PoC)\n\nhttps://github.com/masa42/CVE-2024-38819-POC\n\nBAADTokenBroker\n\nhttps://github.com/secureworks/BAADTokenBroker\n\n#HackersForum", "creation_timestamp": "2024-12-20T03:35:09.000000Z"}, {"uuid": "00aca653-6743-42be-bf9d-99b216c54963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4006", "content": "#GitHub #Tools\n\nMy various vulnerability scripts with notes \n\nhttps://github.com/momika233/loxs-optimized/\n\nComplete list of LPE exploits for Windows (starting from 2023)\n\nhttps://github.com/MzHmO/Exploit-Street\n\nA comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.\n\nhttps://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes\n\nPendingFileRenameOperations + Junctions EDR Disable\n\nhttps://github.com/rad9800/FileRenameJunctionsEDRDisable\n\nCVE-2024-38819: Proof of Concept (PoC)\n\nhttps://github.com/masa42/CVE-2024-38819-POC\n\nBAADTokenBroker\n\nhttps://github.com/secureworks/BAADTokenBroker\n\n#HackersForum", "creation_timestamp": "2024-12-20T03:35:00.000000Z"}, {"uuid": "5ac1be93-6435-47ae-b8a8-1a8c16e23c7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2428", "content": "CVE-2024-38819\n*\nSpring Boot 3.3.4, based on Spring Framework 6.1.13 path traversal exploit\n*\nPOC + docker", "creation_timestamp": "2024-12-14T15:46:31.000000Z"}, {"uuid": "a97d68cf-619a-4e96-9aed-3d720effa9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7752", "content": "#GitHub #Tools\n\nMy various vulnerability scripts with notes \n\nhttps://github.com/momika233/loxs-optimized/\n\nComplete list of LPE exploits for Windows (starting from 2023)\n\nhttps://github.com/MzHmO/Exploit-Street\n\nA comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.\n\nhttps://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes\n\nPendingFileRenameOperations + Junctions EDR Disable\n\nhttps://github.com/rad9800/FileRenameJunctionsEDRDisable\n\nCVE-2024-38819: Proof of Concept (PoC)\n\nhttps://github.com/masa42/CVE-2024-38819-POC\n\nBAADTokenBroker\n\nhttps://github.com/secureworks/BAADTokenBroker\n\n#HackersForum", "creation_timestamp": "2024-12-20T03:35:09.000000Z"}, {"uuid": "ebe7a367-3895-43e3-9082-bce101350178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/26822", "content": "\u26a1\ufe0fCVE-2024-38819: Spring Framework Path Traversal PoC Exploit Released.\n\n#CyberBulletin", "creation_timestamp": "2024-12-16T05:52:55.000000Z"}, {"uuid": "07d7efa2-f547-4e4e-9f10-4592c6b515cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "seen", "source": "https://t.me/suboxone_chatroom/1563", "content": "#exploit \n1. Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE\nhttps://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875\n\n2. CVE-2024-38819:\nhttps://github.com/masa42/CVE-2024-38819-POC\n\n3. CVE-2024-24942:\nPath traversal in SwaggerUI-java\u00a0within JetBrains TeamCity\nhttps://blog.0daylabs.com/2024/12/11/jetbrains-teamcity-authbypass-path-traversal", "creation_timestamp": "2025-01-27T07:06:59.000000Z"}, {"uuid": "b75513d9-aaf2-414e-b7fd-6d39fd890d5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/nusantaraMYID/1788", "content": "Spring Framework Path Traversal Vulnerability (CVE-2024-38819) PoC Exploit Released \u2013 gbhackers.com\n\nWed, 18 Dec 2024 15:34:28", "creation_timestamp": "2024-12-18T09:03:40.000000Z"}, {"uuid": "2626167b-25a7-4c19-88f3-550a28743eb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11586", "content": "#exploit \n1. Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE\nhttps://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875\n\n2. CVE-2024-38819:\nhttps://github.com/masa42/CVE-2024-38819-POC\n\n3. CVE-2024-24942:\nPath traversal in SwaggerUI-java\u00a0within JetBrains TeamCity\nhttps://blog.0daylabs.com/2024/12/11/jetbrains-teamcity-authbypass-path-traversal", "creation_timestamp": "2024-12-21T18:13:24.000000Z"}, {"uuid": "667a293e-5044-45ce-8d3e-398c4f19eec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-38819", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113680632152929678", "content": "", "creation_timestamp": "2024-12-19T17:19:46.948080Z"}, {"uuid": "644893e5-74a7-494f-b5f3-d78af75a99e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldoi4q7xrl2a", "content": "", "creation_timestamp": "2024-12-19T18:15:56.244372Z"}, {"uuid": "04721675-6394-4874-943d-c682165497d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-38819", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-38819.yaml", "content": "", "creation_timestamp": "2026-04-13T08:06:30.000000Z"}, {"uuid": "9e9f6ee8-f45e-4554-a630-3ff4b6a6125a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-38819", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mjfrblz7iv23", "content": "", "creation_timestamp": "2026-04-13T21:03:07.315548Z"}, {"uuid": "4208df2e-e23b-426c-a9e4-445d5f55b962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1140", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-38819\n\ud83d\udd39 Description: Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.\n\ud83d\udccf Published: 2024-12-19T17:15:12.704Z\n\ud83d\udccf Modified: 2025-01-10T13:06:45.393Z\n\ud83d\udd17 References:\n1. https://spring.io/security/cve-2024-38819", "creation_timestamp": "2025-01-10T14:06:22.000000Z"}, {"uuid": "5b005fde-088b-4359-8448-fdfb995d38e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/1760", "content": "\u26a1\ufe0fCVE-2024-38819: Spring Framework Path Traversal PoC Exploit Released.\n\n#CyberBulletin", "creation_timestamp": "2024-12-16T05:52:56.000000Z"}, {"uuid": "717dbda3-c61a-456d-9fd2-f4b04fbc602d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/6536", "content": "Spring Framework Path Traversal Vulnerability (CVE-2024-38819) PoC Exploit Released \u2013 gbhackers.com\n\nWed, 18 Dec 2024 15:34:28", "creation_timestamp": "2024-12-18T09:03:43.000000Z"}, {"uuid": "62ae04da-9f9e-45bf-8248-07aea2dc45a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/944", "content": "Spring Framework Path Traversal Vulnerability (CVE-2024-38819) PoC Exploit Released \u2013 gbhackers.com\n\nWed, 18 Dec 2024 15:34:28", "creation_timestamp": "2024-12-18T09:03:43.000000Z"}, {"uuid": "9b79218e-77d2-4779-9b80-42151b9eb963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "Telegram/VYa4orlCMjHznzXlQOmmiucPQN5A-PV1JKj6Robjtx-R68k", "content": "", "creation_timestamp": "2024-12-18T09:03:40.000000Z"}, {"uuid": "71ff5a73-7fcf-42bb-bcca-3abef9046ad5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113869714895593544", "content": "", "creation_timestamp": "2025-01-22T02:46:01.128127Z"}, {"uuid": "5308c749-f791-4fe6-b1b2-d1fa1e62746b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "published-proof-of-concept", "source": "Telegram/EjVQfzLMdxKWiZinMuDr9sJ3xsdPZ04WxSjwnXbemefXrlE", "content": "", "creation_timestamp": "2025-06-25T23:00:05.000000Z"}, {"uuid": "1bf732e5-541f-47f7-8db6-efce6fc373d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38819", "type": "seen", "source": "https://t.me/cvedetector/13354", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38819 - Spring Path Traversal Error\", \n  \"Content\": \"CVE ID : CVE-2024-38819 \nPublished : Dec. 19, 2024, 6:15 p.m. | 33\u00a0minutes ago \nDescription : Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T19:50:12.000000Z"}]}