exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files from Jaggar Henry

First Active2024-03-06
Last Active2024-09-11
VICIdial 2.14-917a Remote Code Execution
Posted Sep 11, 2024
Authored by Jaggar Henry | Site korelogic.com

An attacker with authenticated access to VICIdial version 2.14-917a as an agent can execute arbitrary shell commands as the root user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.

tags | exploit, arbitrary, shell, root
advisories | CVE-2024-8504
SHA-256 | 6b4666c70098b4747658896c605a4f2b8c41c41c51144da20cf5be37e90a20b0
VICIdial 2.14-917a SQL Injection
Posted Sep 11, 2024
Authored by Jaggar Henry | Site korelogic.com

An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial version 2.14-917a to enumerate database records. By default, VICIdial stores plaintext credentials within the database.

tags | exploit, sql injection
advisories | CVE-2024-8503
SHA-256 | 4fe5d734ae07a38eb7770811089de30239da19ca25794be8de02bb80d866aa1f
Journyx 11.5.4 XML Injection
Posted Aug 8, 2024
Authored by Jaggar Henry | Site korelogic.com

Journyx version 11.5.4 has an issue where the soap_cgi.pyc API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.

tags | exploit, web, local
advisories | CVE-2024-6893
SHA-256 | d02349f8de0a00286e575cc45dab4471af755c8a75e014e67fe77d724cd9c5fa
Journyx 11.5.4 Cross Site Scripting
Posted Aug 8, 2024
Authored by Jaggar Henry | Site korelogic.com

Journyx version 11.5.4 suffers from a cross site scripting vulnerability due to mishandling of the error_description during an active directory login flow.

tags | exploit, xss
advisories | CVE-2024-6892
SHA-256 | 9a80a13f999f61d2fbcd9c872ce0429b0fdbb765e1d12b15c39ea815ad17aa65
Journyx 11.5.4 Authenticated Remote Code Execution
Posted Aug 8, 2024
Authored by Jaggar Henry | Site korelogic.com

Journyx version 11.5.4 has an issue where attackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow.

tags | exploit, python
advisories | CVE-2024-6891
SHA-256 | 3bd6b3cad1bc2ee8d0610e9fb86fce5f44fde3b2f6c6e92fc16ee37f0e43bb27
Journyx 11.5.4 Unauthenticated Password Reset Bruteforce
Posted Aug 8, 2024
Authored by Jaggar Henry | Site korelogic.com

Journyx version 11.5.4 suffers from an issue where password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.

tags | exploit
advisories | CVE-2024-6890
SHA-256 | 71ffa9c9bad198abbd7c7f62d4385be15d0013937d9b80df7f1749718fd1d3b1
Open WebUI 0.1.105 File Upload / Path Traversal
Posted Aug 8, 2024
Authored by Jaggar Henry, Sean Segreti | Site korelogic.com

Open WebUI version 0.1.105 suffers from arbitrary file upload and path traversal vulnerabilities.

tags | exploit, arbitrary, vulnerability, file upload
advisories | CVE-2024-6707
SHA-256 | ec5387176f30bac9fa4d3eadc1c952af22cf21e137493ca6d50297eda34a6c34
Open WebUI 0.1.105 Persistent Cross Site Scripting
Posted Aug 8, 2024
Authored by Jaggar Henry, Sean Segreti | Site korelogic.com

Open WebUI version 0.1.105 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-6706
SHA-256 | 658c9c08ea4ec4d262623596aacd371e3b13671c5709eaa27c2e69d347ea9ae5
Artica Proxy Unauthenticated PHP Deserialization
Posted Mar 27, 2024
Authored by h00die-gr3y, Jaggar Henry | Site metasploit.com

A command injection vulnerability in Artica Proxy appliance versions 4.50 and 4.40 allows remote attackers to run arbitrary commands via an unauthenticated HTTP request. The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the www-data user.

tags | exploit, remote, web, arbitrary, php, code execution
advisories | CVE-2024-2054
SHA-256 | 769d2d7e8f18e8bd0ce142472f159825e87239bfc4426229f241a00de99425a0
Artica Proxy 4.50 Loopback Service Disclosure
Posted Mar 6, 2024
Authored by Jim Becher, Jaggar Henry | Site korelogic.com

Services that are running and bound to the loopback interface on the Artica Proxy version 4.50 are accessible through the proxy service. In particular, the tailon service is running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

tags | exploit, root, tcp
advisories | CVE-2024-2056
SHA-256 | 0693c2ce363baaef7b371443418fb29623edc052f8d82f02eea207672f271e4b
Artica Proxy 4.50 Unauthenticated PHP Deserialization
Posted Mar 6, 2024
Authored by Jaggar Henry | Site korelogic.com

The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the www-data user. Version 4.50 is affected.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2024-2054
SHA-256 | 8e2ee354af5fde39323dcb9b78bd8d0b892172400746b1b66015b3a87cbd8630
Artica Proxy 4.40 / 4.50 Local File Inclusion / Traversal
Posted Mar 6, 2024
Authored by Jaggar Henry | Site korelogic.com

Artica Proxy versions 4.40 and 4.50 suffer from a local file inclusion protection bypass vulnerability that allows for path traversal.

tags | exploit, local, bypass, file inclusion
advisories | CVE-2024-2053
SHA-256 | ee5d3d2cce629647f1cc48769c74910aca7883ad99b79b7b1c766a0e28a65ddf
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close