Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
Common Information
Type Value
UUID 89f44dba-ffb9-4fd3-8c35-d12436101a26
Fingerprint b449b99f28a9478a
Analysis status DONE
Considered CTI value 1
Text language
Published Oct. 17, 2022, 4:40 p.m.
Added to db Feb. 17, 2023, 10:01 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
Title Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
Detected Hints/Tags/Attributes 57/1/24
Attributes
Details Type #Events CTI Value
Details CVE 5
cve-2022-42948
Details CVE 9
cve-2022-39197
Details Domain 1
org.mozilla.java
Details Domain 208
mp.weixin.qq.com
Details Domain 4128
github.com
Details Domain 5
www.javatpoint.com
Details Domain 1
www.java2s.com
Details Domain 1
www.agarri.fr
Details File 1
tag.obj
Details File 1
apache.bat
Details File 1
swing.js
Details File 1
1.svg
Details File 5
mozilla.java
Details File 14
www.java
Details File 1
getwritemethod-0-4.html
Details File 816
index.html
Details Github username 5
fuzzysecurity
Details IPv4 1441
127.0.0.1
Details Url 1
http://127.0.0.1:8000/1.svg
Details Url 1
https://mp.weixin.qq.com/s/l5e2p_wtyscyyhye0lzrdq
Details Url 1
https://github.com/fuzzysecurity/fermion
Details Url 1
https://www.javatpoint.com/java-swing
Details Url 1
http://www.java2s.com/example/java-api/java/beans/propertydescriptor/getwritemethod-0-4.html
Details Url 1
https://www.agarri.fr/blog/archives/2012/05/11/svg_files_and_java_code_execution/index.html