CVE-2023-31128 – NextCloud Cookbook's pull-checks.yml workflow is vulnerable to OS Command Injection
https://notcve.org/view.php?id=CVE-2023-31128
Those who have forked the NextCloud Cookbook repository should make sure their forks are on the latest version to prevent code injection attacks and similar. • https://github.com/nextcloud/cookbook/blob/a14d6ffc4d45e1447556f68606129dfd6c1505cf/.github/workflows/pull-checks.yml#L67 https://github.com/nextcloud/cookbook/commit/489bb744 https://github.com/nextcloud/cookbook/commit/a46d98559e2c64292da9ffb06138cccc2e50ae1b https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h https://securitylab.github.com/research/github-actions-untrusted-input • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-30145 – Camaleon CMS v2.7.0 - Server-Side Template Injection (SSTI)
https://notcve.org/view.php?id=CVE-2023-30145
Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the formats parameter. Camaleon CMS version 2.7.0 suffers from a server-side template injection vulnerability. • https://www.exploit-db.com/exploits/51489 https://github.com/paragbagul111/CVE-2023-30145 http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection https://drive.google.com/file/d/11MsSYqUnDRFjcwbQKJeL9Q8nWpgVYf2r/view?usp=share_link https://portswigger.net/research/server-side-template-injection • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-33440 – Faculty Evaluation System 1.0 - Unauthenticated File Upload
https://notcve.org/view.php?id=CVE-2023-33440
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php? • https://www.exploit-db.com/exploits/51495 http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html https://github.com/F14me7wq/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/RCE-1.md •
CVE-2023-31874 – Yank Note v3.52.1 (Electron) - Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2023-31874
Yank Note version 3.52.1 suffers from an arbitrary code execution vulnerability. • https://www.exploit-db.com/exploits/51470 http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2023-31873 – Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2023-31873
Gin Markdown Editor version 0.7.4 suffers from an arbitrary code execution vulnerability. • https://www.exploit-db.com/exploits/51469 http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html •