{"vulnerability": "cve-2021-22056", "sightings": [{"uuid": "7d389a23-8558-48b4-8633-eef06440d1ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22056", "type": "published-proof-of-concept", "source": "https://t.me/burpsuite/328", "content": "Stealing administrative JWT's through post auth SSRF (CVE-2021-22056)\n\nhttps://blog.assetnote.io/2022/01/17/workspace-one-access-ssrf/", "creation_timestamp": "2022-06-17T01:37:28.000000Z"}, {"uuid": "021f4634-0aaf-4476-9e84-07ed236f68d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22056", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5227", "content": "#Offensive_security\n1. Capturing RDP NetNTLMv2 Hashes:\nAttack details and a Technical How-To Guide\nhttps://www.gosecure.net/blog/2022/01/17/capturing-rdp-netntlmv2-hashes-attack-details-and-a-technical-how-to-guide\n2. Stealing administrative JWT's through post auth SSRF (CVE-2021-22056)\nhttps://blog.assetnote.io/2022/01/17/workspace-one-access-ssrf", "creation_timestamp": "2022-01-18T12:19:43.000000Z"}, {"uuid": "143c69f6-55dd-475c-9346-05714960b432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22056", "type": "published-proof-of-concept", "source": "https://t.me/HelixsCrewOfficial/151", "content": "FROM INTERNET\n\n1)DOM XSS through ads\nhttps://hackerone.com/reports/889041\n\n2)IDOR leads to 2fa Bypass\nhttps://medium.com/@arthbajpai277/idor-leads-to-2fa-bypass-3331cec2db64\n\n3)Critical XSS in chrome extension\nhttps://medium.com/@p3rr0x22/critical-xss-in-chrome-extension-b55757a2074\n\n4)Cross Site Port Attack in Wild\nhttps://thehemdeep.medium.com/cross-site-port-attack-in-wild-9d2f6af36455\n\n5)Stealing administrative JWT's through post auth SSRF (CVE-2021-22056)\nhttps://blog.assetnote.io/2022/01/17/workspace-one-access-ssrf/\n\n6)Full SSRF by exporting PDF\nhttps://amakki.me/full-ssrf-by-exporting-pdf-bbe1bfde24c4\n\n7)My Pentest Log -3-\nhttps://hcibo.medium.com/my-pentest-log-3-a0d15eb0de72\n\n8)Day 14, Set Up Environment for Pentesting #100DaysofHacking\nhttps://infosecwriteups.com/day-14-set-up-environment-for-pentesting-100daysofhacking-f8069e91fcd2\n\n9)Jobs in Cybersecurity\nhttps://medium.com/@vijayynot108/jobs-in-cybersecurity-3c609c23ecf6\n\n14)Phishmonger \u2013 Phishing Framework for Pentesters\nhttps://crackcodes.in/2022/01/phishmonger-phishing-framework-for-pentesters/\n\n15)Vulnerability Summary for the Week of January 10, 2022\nhttps://www.cisa.gov/uscert/ncas/bulletins/sb22-017\n\n- Random People", "creation_timestamp": "2022-01-19T02:28:51.000000Z"}, {"uuid": "49bea079-64f0-4a11-b8f7-84e049862dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22056", "type": "seen", "source": "https://t.me/cibsecurity/34316", "content": "\u203c CVE-2021-22056 \u203c\n\nVMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 and Identity Manager 3.3.5, 3.3.4, and 3.3.3 contain an SSRF vulnerability. A malicious actor with network access may be able to make HTTP requests to arbitrary origins and read the full response.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-21T00:11:45.000000Z"}, {"uuid": "8b266d95-b592-4d47-954c-92e5f84d3863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22056", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5961", "content": "Stealing administrative JWT's through post auth SSRF (CVE-2021-22056)\n\nhttps://blog.assetnote.io/2022/01/17/workspace-one-access-ssrf/", "creation_timestamp": "2022-01-18T16:20:06.000000Z"}]}