12.7K subscribers
550 photos
27 videos
24 files
890 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
⚙️ Citrix Virtual Apps and Desktops — Unauthenticated RCE

This vulnerability in Citrix Virtual Apps and Desktops enables unauthorized users to achieve remote code execution through a misconfigured Microsoft Message Queuing (MSMQ) service accessible over HTTP. The issue stems from using an outdated BinaryFormatter for data deserialization, allowing attackers to run commands with SYSTEM privileges on the Citrix server.

🔗 Research:
https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/

🔗 Source:
https://github.com/watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit

#citrix #msmq #deserialization #unauth #rce
👍43😱2👎1🔥1
⚙️ Wazuh — Unsafe Deserialization RCE (CVE-2025-24016)

An unsafe deserialization vulnerability in Wazuh servers allows remote code execution through unsanitized dictionary injection in DAPI requests/responses. If an attacker injects an unsanitized dictionary into a DAPI request or response, they can craft an unhandled exception, allowing arbitrary Python code execution.

🔗 Source:
https://github.com/0xjessie21/CVE-2025-24016

#wazuh #deserialization #rce #cve
1🔥155👍3
🖼️ SharePoint RCE — ToolShell (CVE‑2025‑53770)

Critical deserialization of untrusted data vulnerability in Microsoft SharePoint allows unauthenticated remote code execution over the network. The exploit uses POST requests to /_layouts/15/ToolPane.aspx with HTTP Referer header /_layouts/SignOut.aspx to bypass authentication, then extracts MachineKey configuration to generate valid __VIEWSTATE payloads for arbitrary code execution via a single HTTP request.

🔗 Research:
https://research.eye.security/sharepoint-under-siege/

🔗 PoC:
https://gist.github.com/gboddin/6374c04f84b58cef050f5f4ecf43d501

🔗 Exploit:
https://github.com/soltanali0/CVE-2025-53770-Exploit

#ad #sharepoint #deserialization #toolshell #rce
Please open Telegram to view this post
VIEW IN TELEGRAM
14🔥13👍4