2023-07-06 16:17:17 +09:00
[
{
"id" : 655758961 ,
"name" : "CVE-2023-27372" ,
"full_name" : "nuts7\/CVE-2023-27372" ,
"owner" : {
"login" : "nuts7" ,
"id" : 66285128 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66285128?v=4" ,
"html_url" : "https:\/\/github.com\/nuts7"
} ,
"html_url" : "https:\/\/github.com\/nuts7\/CVE-2023-27372" ,
"description" : "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1." ,
"fork" : false ,
"created_at" : "2023-06-19T14:36:47Z" ,
2023-08-19 03:28:14 +09:00
"updated_at" : "2023-08-18T15:05:05Z" ,
2023-07-06 16:17:17 +09:00
"pushed_at" : "2023-06-22T07:19:36Z" ,
2023-08-19 03:28:14 +09:00
"stargazers_count" : 49 ,
"watchers_count" : 49 ,
2023-07-06 16:17:17 +09:00
"has_discussions" : false ,
2023-07-30 22:46:41 +09:00
"forks_count" : 5 ,
2023-07-06 16:17:17 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2023-27372" ,
"cve2023" ,
"deserialization" ,
"exploit" ,
"nuclei" ,
"nuclei-templates" ,
"php" ,
"poc" ,
"rce" ,
"remote-code-execution" ,
"spip" ,
"vulnerability" ,
"web-hacking"
] ,
"visibility" : "public" ,
2023-07-30 22:46:41 +09:00
"forks" : 5 ,
2023-08-19 03:28:14 +09:00
"watchers" : 49 ,
2023-07-06 16:17:17 +09:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 658454751 ,
"name" : "CVE-2023-27372" ,
"full_name" : "tucommenceapousser\/CVE-2023-27372" ,
"owner" : {
"login" : "tucommenceapousser" ,
"id" : 129875733 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4" ,
"html_url" : "https:\/\/github.com\/tucommenceapousser"
} ,
"html_url" : "https:\/\/github.com\/tucommenceapousser\/CVE-2023-27372" ,
"description" : "SPIP Vulnerability Scanner - CVE-2023-27372 Detector" ,
"fork" : false ,
"created_at" : "2023-06-25T19:39:37Z" ,
"updated_at" : "2023-06-25T19:39:38Z" ,
"pushed_at" : "2023-06-25T19:31:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
2023-07-11 23:08:15 +09:00
{
"id" : 665042042 ,
"name" : "CVE-2023-27372-POC" ,
"full_name" : "izzz0\/CVE-2023-27372-POC" ,
"owner" : {
"login" : "izzz0" ,
"id" : 88706802 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88706802?v=4" ,
"html_url" : "https:\/\/github.com\/izzz0"
} ,
"html_url" : "https:\/\/github.com\/izzz0\/CVE-2023-27372-POC" ,
"description" : "CVE-2023-27372-SPIP-CMS-Bypass" ,
"fork" : false ,
"created_at" : "2023-07-11T10:00:04Z" ,
2023-07-19 15:35:56 +09:00
"updated_at" : "2023-07-19T03:20:54Z" ,
2023-07-12 15:55:37 +09:00
"pushed_at" : "2023-07-12T05:14:11Z" ,
2023-07-19 15:35:56 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-07-11 23:08:15 +09:00
"has_discussions" : false ,
2023-07-12 15:55:37 +09:00
"forks_count" : 2 ,
2023-07-11 23:08:15 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-07-12 15:55:37 +09:00
"forks" : 2 ,
2023-07-19 15:35:56 +09:00
"watchers" : 2 ,
2023-07-11 23:08:15 +09:00
"score" : 0 ,
2023-07-12 15:55:37 +09:00
"subscribers_count" : 1
2023-08-01 09:34:38 +09:00
} ,
{
"id" : 673080065 ,
"name" : "CVE-2023-27372" ,
"full_name" : "Pari-Malam\/CVE-2023-27372" ,
"owner" : {
"login" : "Pari-Malam" ,
"id" : 25004320 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4" ,
"html_url" : "https:\/\/github.com\/Pari-Malam"
} ,
"html_url" : "https:\/\/github.com\/Pari-Malam\/CVE-2023-27372" ,
"description" : "Perform With Mass Remote Code Execution In SPIP Version (4.2.1)" ,
"fork" : false ,
"created_at" : "2023-07-31T20:32:36Z" ,
2023-08-11 15:34:44 +09:00
"updated_at" : "2023-08-11T05:25:59Z" ,
2023-08-01 09:34:38 +09:00
"pushed_at" : "2023-07-31T20:54:36Z" ,
2023-08-11 15:34:44 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-08-01 09:34:38 +09:00
"has_discussions" : false ,
2023-08-02 15:32:14 +09:00
"forks_count" : 3 ,
2023-08-01 09:34:38 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2023-08-02 15:32:14 +09:00
"topics" : [
"rce-exploit" ,
"remote-code-execution" ,
"spip-plugin"
] ,
2023-08-01 09:34:38 +09:00
"visibility" : "public" ,
2023-08-02 15:32:14 +09:00
"forks" : 3 ,
2023-08-11 15:34:44 +09:00
"watchers" : 3 ,
2023-08-01 09:34:38 +09:00
"score" : 0 ,
2023-08-01 15:41:24 +09:00
"subscribers_count" : 1
2023-09-08 03:29:40 +09:00
} ,
{
"id" : 688571632 ,
"name" : "CVE-2023-27372-PoC" ,
"full_name" : "redboltsec\/CVE-2023-27372-PoC" ,
"owner" : {
"login" : "redboltsec" ,
"id" : 144297535 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/144297535?v=4" ,
"html_url" : "https:\/\/github.com\/redboltsec"
} ,
"html_url" : "https:\/\/github.com\/redboltsec\/CVE-2023-27372-PoC" ,
"description" : "This is a PoC for CVE-2023-27372 and spawns a fully interactive shell." ,
"fork" : false ,
"created_at" : "2023-09-07T16:17:03Z" ,
"updated_at" : "2023-09-07T16:20:50Z" ,
"pushed_at" : "2023-09-07T16:20:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
2023-07-06 16:17:17 +09:00
}
]