{"vulnerability": "cve-2023-3009", "sightings": [{"uuid": "8f560108-06ef-4324-984e-6b9e544a7c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3009", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/8402", "content": "#exploit\n1. CVE-2023-34152 / CVE-2023-34151:\nShell Command Injection in ImageMagick / \nUndefined behaviors of casting double to size_t in svg, mvg, and other coders\nhttps://github.com/ImageMagick/ImageMagick/issues/6341\n]-&gt; CVE-2023-34153:\u00a0Shell command injection vulnerability\nhttps://github.com/ImageMagick/ImageMagick/issues/6338\n\n2. CVE-2023-28782:\nPHP Object Injection Flaw in WordPress Gravity Forms Plugin\nhttps://securityonline.info/cve-2023-28782-php-object-injection-flaw-in-wordpress-gravity-forms-plugin-with-1-million-active-installations\n\n3. CVE-2023-3009:\nStored XSS on item name - Bypassing CVE-2023-2516 in TeamPass &lt;3.0.9\nhttps://github.com/mnqazi/CVE-2023-3009", "creation_timestamp": "2023-06-01T13:16:22.000000Z"}, {"uuid": "4bb9dbad-0c95-4d7e-a53f-6f28cd07e470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3009", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4465", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aStored XSS vulnerability in Teampass &lt; 3.0.9 (Bypass of CVE-2023\u20132516) \u2014 M Nadeem Qazi\nURL\uff1ahttps://github.com/mnqazi/CVE-2023-3009\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:26:19.000000Z"}, {"uuid": "bb9f98c0-d052-4a0a-ab0f-55f8fe467de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3009", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1147", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3009\n\ud83d\udd39 Description: Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.\n\ud83d\udccf Published: 2023-05-31T00:00:00\n\ud83d\udccf Modified: 2025-01-10T14:52:39.174Z\n\ud83d\udd17 References:\n1. https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f\n2. https://github.com/nilsteampassnet/teampass/commit/6ba8cf1f4b89d62a08d122d533ccf4cb4e26a4ee", "creation_timestamp": "2025-01-10T15:03:31.000000Z"}, {"uuid": "9deb295a-f585-43d7-a4cd-d7c38659abbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3009", "type": "seen", "source": "https://t.me/cibsecurity/64815", "content": "\u203c CVE-2023-3009 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-31T16:36:48.000000Z"}, {"uuid": "70ab7dfa-fead-4e33-9684-25890e5aa469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3009", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3073", "content": "Tools - Hackers Factory \n\nCVE-2023-3009\n\nStored #XSS on item name - Bypassing CVE-2023-2516 in TeamPass &lt; 3.0.9 - by M Nadeem Qazi.\n\nhttps://github.com/mnqazi/CVE-2023-3009\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bApplywdac \n\nPowerShell script for applying WDAC policies.\n\nhttps://github.com/vu-ls/applywdac\n\n#cybersecurity #infosec\n\n\u200b\u200bfake-useragent\n\nUp-to-date simple useragent faker with real world database.\n\nhttps://github.com/fake-useragent/fake-useragent\n\n#cybersecurity #infosec #privacy\n\n\u200b\u200bProxiFyre \n\nAdvanced SOCKS5 Routing Solution for Windows.\n\nhttps://github.com/wiresock/socksify\n\n#cybersecurity #infosec #privacy\n\n\u200b\u200bThe DEF CON CTF 2023 Qualifier\n\nThis repository contains the open source release for Nautilus Institute's 2023 DEF CON CTF qualifier.\n\nhttps://github.com/Nautilus-Institute/quals-2023\n\n#cybersecurity #infosec\n\n\u200b\u200bWordlists\n\nReal-world infosec wordlists, updated regularly! These wordlists are based on the source code of the CMSes/servers/frameworks listed here. The current wordlists include:\n\n\u2022 Wordpress\n\u2022 Joomla\n\u2022 Drupal\n\u2022 Magento\n\u2022 Ghost\n\u2022 Tomcat\n\nhttps://github.com/trickest/wordlists\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bNanorobeus\n\nCOFF file (BOF) for managing #Kerberos tickets.\n\nhttps://github.com/wavvs/nanorobeus\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-23638\n\nApache Dubbo Vulnerability Exploitation Engineering Practice, covering Dubbo 3.x from service discovery to vulnerability exploitation and reverse display. \n\nhttps://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200bEPI\n\nProcess injection through entry points hijacking.\n\nhttps://github.com/Kudaes/EPI\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCRTER\n\nA command-line tool for fetching subdomains using the CRT.SH certificate search engine. It allows you to provide a list of domain names or fully-qualified domain names (FQDNs) and retrieve the associated subdomains. The tool fetches the subdomains from CRT.SH and saves them to an output file.\n\nhttps://github.com/Micro0x00/CRTER\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bHALA\n\nHALA offers a powerful capability that enables you to identify reflected parameters within the response, providing valuable assistance in your testing and hacking endeavors.\n\nhttps://github.com/whalebone7/Hala\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-06-02T09:34:10.000000Z"}, {"uuid": "bf84937d-0533-4d40-9d58-58a3626de9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30092", "type": "seen", "source": "https://t.me/cibsecurity/63435", "content": "\u203c CVE-2023-30092 \u203c\n\nSourceCodester Online Pizza Ordering System v1.0 is vulnerable to SQL Injection via the QTY parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-08T18:37:46.000000Z"}, {"uuid": "593e2ab9-c3d9-4376-8672-6df4f1ab2993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30093", "type": "seen", "source": "https://t.me/cibsecurity/63341", "content": "\u203c CVE-2023-30093 \u203c\n\nAn arbitrary file upload vulnerability in Open Networking Foundation ONOS from version 1.9.0 until 2.7.0 allows attackers to execute arbitrary code via uploading a crafted YAML file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T02:23:35.000000Z"}, {"uuid": "f2b53d26-8bb2-4d02-a166-115215b8bc7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30094", "type": "seen", "source": "https://t.me/cibsecurity/63332", "content": "\u203c CVE-2023-30094 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in TotalJS Flow v10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field in the settings module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T00:37:21.000000Z"}, {"uuid": "8f5b4e68-8902-4f38-9bef-ade3eddaf098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30097", "type": "seen", "source": "https://t.me/cibsecurity/63329", "content": "\u203c CVE-2023-30097 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the private task field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T00:37:18.000000Z"}, {"uuid": "9081298a-97b1-4284-8b46-cce086fd7c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30090", "type": "seen", "source": "https://t.me/cibsecurity/63346", "content": "\u203c CVE-2023-30090 \u203c\n\nSemcms Shop v4.2 was discovered to contain an arbitrary file uplaod vulnerability via the component SEMCMS_Upfile.php. This vulnerability allows attackers to execute arbitrary code via uploading a crafted PHP file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T07:24:34.000000Z"}]}