Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
Tags
Common Information
Type | Value |
---|---|
UUID | 89f44dba-ffb9-4fd3-8c35-d12436101a26 |
Fingerprint | b449b99f28a9478a |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | Oct. 17, 2022, 4:40 p.m. |
Added to db | Feb. 17, 2023, 10:01 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1 |
Title | Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1 |
Detected Hints/Tags/Attributes | 57/1/24 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 5 | cve-2022-42948 |
|
Details | CVE | 9 | cve-2022-39197 |
|
Details | Domain | 1 | org.mozilla.java |
|
Details | Domain | 208 | mp.weixin.qq.com |
|
Details | Domain | 4128 | github.com |
|
Details | Domain | 5 | www.javatpoint.com |
|
Details | Domain | 1 | www.java2s.com |
|
Details | Domain | 1 | www.agarri.fr |
|
Details | File | 1 | tag.obj |
|
Details | File | 1 | apache.bat |
|
Details | File | 1 | swing.js |
|
Details | File | 1 | 1.svg |
|
Details | File | 5 | mozilla.java |
|
Details | File | 14 | www.java |
|
Details | File | 1 | getwritemethod-0-4.html |
|
Details | File | 816 | index.html |
|
Details | Github username | 5 | fuzzysecurity |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | Url | 1 | http://127.0.0.1:8000/1.svg |
|
Details | Url | 1 | https://mp.weixin.qq.com/s/l5e2p_wtyscyyhye0lzrdq |
|
Details | Url | 1 | https://github.com/fuzzysecurity/fermion |
|
Details | Url | 1 | https://www.javatpoint.com/java-swing |
|
Details | Url | 1 | http://www.java2s.com/example/java-api/java/beans/propertydescriptor/getwritemethod-0-4.html |
|
Details | Url | 1 | https://www.agarri.fr/blog/archives/2012/05/11/svg_files_and_java_code_execution/index.html |