SourceCodester Facebook News Feed Like 1.0 Post unrestricted upload

Overview

A vulnerability, which was classified as critical, was found in SourceCodester Facebook News Feed Like 1.0. Affected is an unknown function of the component Post Handler. The manipulation leads to unrestricted upload. Using CWE to declare the problem leads to CWE-434. The weakness was published 01/29/2024. This vulnerability is traded as CVE-2024-1027. It is possible to launch the attack remotely. There are no technical details available. There is no exploit available. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1608.002. It is declared as Not defined. As 0-day the estimated underground price was around $0-$5k. [Details]

IOB - Indicator of Behavior (295)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en260
it8
pt6
fr4
de4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

IOC - Indicator of Compromise (13)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeActorTypeConfidence
13.65.218.0/24RedLine StealerpredictiveHigh
23.71.182.0/24Cobalt StrikepredictiveHigh
3X.XX.XXX.X/XXXxxxxpredictiveHigh
4X.XXX.X.X/XXXxxxxxxxxxxxxxxxx XxxpredictiveHigh
5XX.XXX.XX.X/XXXxxxxx XxxxxxpredictiveHigh
6XX.XXX.XXX.X/XXXxxxxpredictiveHigh
7XX.XX.XXX.X/XXXxxxxx XxxxxxxpredictiveHigh
8XX.XX.X.X/XXXxxxxx XxxxxxpredictiveHigh
9XX.XXX.X.X/XXXxxxxxxpredictiveHigh
10XX.XX.XXX.X/XXXxxxxpredictiveHigh
11XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
12XXX.XXX.XXX.X/XXXxxxxxpredictiveHigh
13XXX.XX.XX.X/XXXxxxxpredictiveHigh

TTP - Tactics, Techniques, Procedures (1)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1608.002CAPEC-1CWE-434Incomplete Identification of Uploaded File VariablesverifiedHigh

Do you know our Splunk app?

Download it now for free!