{"vulnerability": "cve-2022-4331", "sightings": [{"uuid": "9e1b0057-0f28-4221-bb8c-f69078ebd056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4331", "type": "seen", "source": "https://t.me/cibsecurity/59760", "content": "\u203c CVE-2022-4331 \u203c\n\nAn issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-10T00:20:41.000000Z"}, {"uuid": "c355f8e1-3419-447d-af85-ba18f122cd85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43310", "type": "seen", "source": "https://t.me/cibsecurity/52795", "content": "\u203c CVE-2022-43310 \u203c\n\nAn Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:52:31.000000Z"}, {"uuid": "df22115b-99e3-4757-a767-d5500d9e087d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4331", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5950", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4331\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it's possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group.\n\ud83d\udccf Published: 2023-03-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T17:25:16.373Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/385050\n2. https://hackerone.com/reports/1791518\n3. https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4331.json", "creation_timestamp": "2025-02-28T18:26:34.000000Z"}, {"uuid": "63c6e65a-a709-472c-ba19-b87802992b9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43317", "type": "seen", "source": "https://t.me/cibsecurity/52612", "content": "\u203c CVE-2022-43317 \u203c\n\nA cross-site scripting (XSS) vulnerability in /hrm/index.php?msg of Human Resource Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-07T18:34:39.000000Z"}, {"uuid": "846166c9-a535-4afb-862e-2ec33847c470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43319", "type": "seen", "source": "https://t.me/cibsecurity/52594", "content": "\u203c CVE-2022-43319 \u203c\n\nAn information disclosure vulnerability in the component vcs/downloadFiles.php?download=./search.php of Simple E-Learning System v1.0 allows attackers to read arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-07T18:34:21.000000Z"}, {"uuid": "c977a1de-5d25-4fe1-aba2-79728a2481da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43318", "type": "seen", "source": "https://t.me/cibsecurity/52606", "content": "\u203c CVE-2022-43318 \u203c\n\nHuman Resource Management System v1.0 was discovered to contain a SQL injection vulnerability via the stateedit parameter at /hrm/state.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-07T18:34:33.000000Z"}, {"uuid": "cf71f8dc-c2a5-46f8-8eaa-2bd509649b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43319", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14945", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43319\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An information disclosure vulnerability in the component vcs/downloadFiles.php?download=./search.php of Simple E-Learning System v1.0 allows attackers to read arbitrary files.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T18:08:35.819Z\n\ud83d\udd17 References:\n1. https://github.com/ImaizumiYui/bug_report/blob/main/vendors/oretnom23/Simple%20E-Learning%20System/discl1.md", "creation_timestamp": "2025-05-05T18:19:30.000000Z"}, {"uuid": "78009797-fa00-4317-ae49-3a3be3e8f678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4331", "type": "seen", "source": "Telegram/j5jvAdPmVowONHQHmoASK9J1aFc3r8YXWa7d_TJeupkTbFHo", "content": "", "creation_timestamp": "2025-03-02T11:45:38.000000Z"}]}