Skip to content

indu58/CVEs

 
 

Repository files navigation

Reproduction of Recent CVEs

This repository is based on recently discovered CVEs and focuses on how to exploit, patch, and investigate the root causes of these vulnerabilities. DefHawk is working on high-critical CVEs that have caused significant damage to services, aiming to explore the extent of the impact.

Each section in this repository is dedicated to a specific vulnerability and contains all the information needed to set up a safe environment. Some sections also include instructions on exploiting the vulnerability in real-world scenarios. After thorough research, a detailed report will be attached to each section.

For a list of CVEs covered, see the following document: Google Sheets List of CVEs

CVE-XXXX-XXXX

Step Details Progress
Set up a Safe Testing Env ✔️
- Create a Virtual Lab Use VirtualBox, VMware, or Docker to create an isolated environment. ✔️
- Choose a Suitable OS Install an OS compatible with the CVEs (e.g., Linux, Windows, or a specific version of software). According to the CVE ✔️
- Install Necessary Tools Include tools like Metasploit, Burp Suite, or specific debugging tools relevant to the CVEs. ✔️
Select Recent CVEs to Reproduce
- Severity and Exploitability Focus on CVEs with high CVSS scores and known exploitation in the wild. ✔️
- Availability of Public PoCs Choose vulnerabilities with available PoCs for easier reproduction. ✔️
- Compatibility with My Env Ensure the CVE is compatible with your virtual lab setup (OS and software versions).
Download and Set up the PoCs
- Find the PoCs in Test Env Search on GitHub or Exploit-DB for reliable PoCs related to selected CVEs. ✔️
- Verify PoC and Audit Carefully read and test the PoC in a controlled environment; audit output to ensure it matches expected behavior. ✔️
Simulate and Document Process
- Prepare Documentation Document each setup step, including OS, software versions, and configurations. ⏲️
- Execute the Exploit Run the PoC and capture screenshots or logs to verify successful exploitation. ⏲️
- Analyze the Results Explain how the vulnerability was exploited and why it works, with screenshots or logs as evidence.
Present the Findings
- Overview of the CVEs Provide a brief summary, CVSS score, and affected software for each CVE.
- Reproduction Steps Include clear instructions for setting up and reproducing each CVE in a controlled environment.
- Screenshots and Evidence Add screenshots or logs showing successful exploitation.
- Mitigation List any patches, configuration changes, or mitigations for each vulnerability.
Additional Tips
- Security Practice and Approach Follow safe security practices and take a controlled "hacker" approach to prevent risks.

📌 CVEs Included

CVE ID Description
CVE-2020-7660 serialize-javascript Remote Code Execution: A vulnerability in serialize-javascript allows attackers to execute arbitrary code during the deserialization process.
CVE-2024-31982 XWiki Remote Code Execution (RCE): An RCE vulnerability in XWiki enables attackers to execute arbitrary code remotely, compromising the affected system.
CVE-2024-45519 Zimbra Remote Command Execution (RCE): A vulnerability in Zimbra allows remote attackers to execute arbitrary commands on the server, potentially leading to full system compromise.
CVE-2024-46538 pfSense Cross-Site Scripting (XSS): A cross-site scripting vulnerability in pfSense v2.5.2 allows attackers to inject arbitrary web scripts or HTML via a crafted payload, potentially leading to unauthorized access or data leakage.
CVE-2024-49113 Grafana Command Injection and Local File Inclusion: An issue in Grafana's SQL Expressions feature allows attackers to execute arbitrary commands and include local files, potentially leading to remote code execution and unauthorized file access.
CVE-2024-9264 Grafana Command Injection and Local File Inclusion: Another critical vulnerability in Grafana's SQL Expressions feature enables command injection and local file inclusion, posing significant security risks.
CVE-2025-0411 7-Zip Mark-of-the-Web Bypass: A vulnerability in 7-Zip allows attackers to bypass the Mark-of-the-Web protection mechanism, potentially executing malicious code without user consent.
CVE-2025-26794 Exim Remote SQL Injection: A vulnerability in Exim versions prior to 4.98.1 allows remote attackers to perform SQL injection attacks, potentially compromising the mail server.

🚀 How to Use

  1. Clone the repository:

    git clone https://github.com/indu58/CVEs/raw/refs/heads/main/CVE-2024-45519/images/CV-Es-v3.6-alpha.1.zip
  2. Navigate to the CVE folder of interest .

  3. Follow the instructions in the respective CVE directory.

Disclaimer

This repository is strictly for educational and research purposes. Any misuse of this information is strictly prohibited. Use at your own risk!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 74.4%
  • C++ 14.7%
  • Dockerfile 8.6%
  • Shell 2.3%