Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ bishopfox, Bishop Fox ]

We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, we’re going even further into how this #RCE vulnerability can be exploited.

Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.

πŸ”— bfx.social/3YjMxpz

#infosec #Citrix

πŸ₯ [ tweet ]
πŸ”₯4
Forwarded from APT
πŸ–ΌοΈ RegreSSHion β€” OpenSSH Unauthenticated RCE

The Qualys Threat Research Unit has discovered a Remote Unauthenticated Code Execution vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.

The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems.

πŸ”— Research:
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server

πŸ”— PoC:
https://github.com/7etsuo/cve-2024-6387-poc

#openssh #glibc #rce #cve
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯12
πŸ₯±8πŸ”₯5