PoC-in-GitHub/2023/CVE-2023-30258.json
2025-11-22 21:42:27 +09:00

255 lines
No EOL
8.9 KiB
JSON

[
{
"id": 748950023,
"name": "CVE-2023-30258-setup",
"full_name": "gy741\/CVE-2023-30258-setup",
"owner": {
"login": "gy741",
"id": 29292618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29292618?v=4",
"html_url": "https:\/\/github.com\/gy741",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gy741\/CVE-2023-30258-setup",
"description": null,
"fork": false,
"created_at": "2024-01-27T06:01:02Z",
"updated_at": "2025-08-12T07:53:56Z",
"pushed_at": "2024-01-27T06:44:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 945494219,
"name": "CVE-2023-30258",
"full_name": "sk00l\/CVE-2023-30258",
"owner": {
"login": "sk00l",
"id": 106868018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106868018?v=4",
"html_url": "https:\/\/github.com\/sk00l",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sk00l\/CVE-2023-30258",
"description": null,
"fork": false,
"created_at": "2025-03-09T15:01:00Z",
"updated_at": "2025-04-20T16:18:40Z",
"pushed_at": "2025-04-20T16:18:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 947211494,
"name": "CVE-2023-30258-magnus-billing-v7-exploit",
"full_name": "tinashelorenzi\/CVE-2023-30258-magnus-billing-v7-exploit",
"owner": {
"login": "tinashelorenzi",
"id": 117823479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117823479?v=4",
"html_url": "https:\/\/github.com\/tinashelorenzi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tinashelorenzi\/CVE-2023-30258-magnus-billing-v7-exploit",
"description": null,
"fork": false,
"created_at": "2025-03-12T10:27:46Z",
"updated_at": "2025-11-04T05:59:07Z",
"pushed_at": "2025-03-12T10:32:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 949660040,
"name": "CVE-2023-30258",
"full_name": "Chocapikk\/CVE-2023-30258",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-30258",
"description": "Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request. ",
"fork": false,
"created_at": "2025-03-16T23:27:52Z",
"updated_at": "2025-03-17T02:37:32Z",
"pushed_at": "2025-03-16T23:52:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 954785282,
"name": "CVE-2023-30258-RCE-POC",
"full_name": "n00o00b\/CVE-2023-30258-RCE-POC",
"owner": {
"login": "n00o00b",
"id": 168068514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168068514?v=4",
"html_url": "https:\/\/github.com\/n00o00b",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n00o00b\/CVE-2023-30258-RCE-POC",
"description": "POC for CVE-2023-30258-RCE by n0o0b",
"fork": false,
"created_at": "2025-03-25T16:00:43Z",
"updated_at": "2025-04-01T13:45:49Z",
"pushed_at": "2025-03-25T16:06:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 1018964759,
"name": "TryHackMe-Room-Walkthrough-Billing",
"full_name": "AdityaBhatt3010\/TryHackMe-Room-Walkthrough-Billing",
"owner": {
"login": "AdityaBhatt3010",
"id": 96762636,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96762636?v=4",
"html_url": "https:\/\/github.com\/AdityaBhatt3010",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AdityaBhatt3010\/TryHackMe-Room-Walkthrough-Billing",
"description": "A detailed walkthrough of TryHackMe's Billing room exploiting CVE-2023-30258 and escalating via fail2ban misconfig",
"fork": false,
"created_at": "2025-07-13T12:53:47Z",
"updated_at": "2025-11-22T12:11:40Z",
"pushed_at": "2025-07-13T13:03:36Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"capturetheflag",
"ctf",
"thm",
"tryhackme"
],
"visibility": "public",
"forks": 0,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},
{
"id": 1059545279,
"name": "CVE-2023-30258-Exploit-For-Magnus-Billing-System",
"full_name": "abdullohqurbon0v\/CVE-2023-30258-Exploit-For-Magnus-Billing-System",
"owner": {
"login": "abdullohqurbon0v",
"id": 152875066,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152875066?v=4",
"html_url": "https:\/\/github.com\/abdullohqurbon0v",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/abdullohqurbon0v\/CVE-2023-30258-Exploit-For-Magnus-Billing-System",
"description": "There are Exploit for Magnus Billing v7 system get root privilages",
"fork": false,
"created_at": "2025-09-18T15:32:51Z",
"updated_at": "2025-09-18T15:33:10Z",
"pushed_at": "2025-09-18T15:33:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1090507189,
"name": "Tryhackme_Billing",
"full_name": "CankunWang\/Tryhackme_Billing",
"owner": {
"login": "CankunWang",
"id": 205040435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/205040435?v=4",
"html_url": "https:\/\/github.com\/CankunWang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CankunWang\/Tryhackme_Billing",
"description": "Billing CTF Machine_CVE-2023-30258_Remote Code Execution",
"fork": false,
"created_at": "2025-11-05T18:58:16Z",
"updated_at": "2025-11-05T18:58:38Z",
"pushed_at": "2025-11-05T18:58:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]