Peach Sandstorm 解析

IOB - Indicator of Behavior (47)

タイムライン

言語

en28
zh12
es4
ru2
de2

国・地域

co26
us10
cn10

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Interspire Email Marketer4
OpenSSL2
SonicWALL SMA10002
Dialogic PowerMedia XMS2
Omeka Classic2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Interspire Email Marketer Dynamiccontenttags.php SQLインジェクション7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.000870.07CVE-2018-19551
2Sales / Company Management System member_order.php SQLインジェクション8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.001720.00CVE-2018-19925
3Interspire Email Marketer Dynamiccontenttags.php SQLインジェクション7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.000870.00CVE-2018-19549
4All-in-One WP Migration Plugin class-ai1wm-backups.php ディレクトリトラバーサル5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.000970.04CVE-2022-1476
5VMware vCenter Server/Cloud Foundation vSphere Client Privilege Escalation8.07.9$5k-$25k$0-$5kHighOfficial Fix0.972990.09CVE-2021-21972
6Advanced Comment System admin.php SQLインジェクション8.57.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.002300.02CVE-2018-18619
7Interspire Email Marketer Dynamiccontenttags.php SQLインジェクション7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.000870.02CVE-2018-19553
8SonicWALL SMA1000 HTTP Connection 特権昇格6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.002380.03CVE-2022-22282
9Omeka Classic クロスサイトスクリプティング3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001100.00CVE-2021-26799
10AgileConfig JWT Secret 弱い暗号化7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.003290.00CVE-2022-35540
11Apache Airflow UI 特権昇格7.17.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.363720.02CVE-2022-40127
12Support Board Plugin SQLインジェクション7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002110.00CVE-2021-24741
13GitLab Project Import 特権昇格8.78.6$0-$5k$0-$5kNot DefinedOfficial Fix0.634360.04CVE-2022-2185
14cPanel cpsrvd クロスサイトスクリプティング5.04.9$0-$5k$0-$5kNot DefinedOfficial Fix0.003450.03CVE-2023-29489
15Labstack Echo Static 特権昇格7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.029330.02CVE-2022-40083
16GitLab Community Edition/Enterprise Edition Runner Registration Token 情報の漏洩7.67.5$0-$5k$0-$5kNot DefinedOfficial Fix0.032780.04CVE-2022-0735
17Git Plugin Build 特権昇格6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.011560.08CVE-2022-36883
18Z-BlogPHP action_crawler.php 特権昇格8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.003190.05CVE-2022-40357
19Dialogic PowerMedia XMS Administrative Console default.db Password 特権昇格6.56.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.06CVE-2018-11634
20Extreme EXOS File 情報の漏洩3.43.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.04CVE-2017-14327

キャンペーン (1)

These are the campaigns that can be associated with the actor:

  • Holmium

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (18)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/var/www/xms/xmsdb/default.dbpredictive
2FileDynamiccontenttags.phppredictive
3Fileinternal/advanced_comment_system/admin.phppredictive
4Filexxxxxx/xxxxxx_xxxxx.xxxpredictive
5Filexxxxxxxx.xxpredictive
6Filexx_xxxxx/xxxxxx/xxxxxxx/xxx/xxxxxx_xxxxxxx.xxxpredictive
7Library/xxxxxxx/xxxxx/xxx.xxxpredictive
8Libraryxxx/xxx/xxxx.xxxxx.xxxpredictive
9Library~/xxx/xxxxx/xxxxx-xxxxx-xxxxxxx.xxxpredictive
10Argumentxxxxxxx[]predictive
11Argumentxxxxx/xxxxxxpredictive
12Argumentxxpredictive
13Argumentxxxxpredictive
14Argumentxxx_xxpredictive
15Argumentxxxxxxxxxpredictive
16Argumentxxxxxxpredictive
17Argumentxxxxxx_xxxx/xxxxxxxxxx/xxxx_xx/xxxxxxxxxxxx_xx/xxxxxxxxxxxx_xxxxxx_xxxx/xxxxxxxxx_xxpredictive
18Argumentxxxx/x_xxxxxpredictive

参考 (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!