Netlas.io
2.02K subscribers
344 photos
3 videos
468 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2024-6387 (and probably CVE-2006-5051): Unauthenticated RCE in OpenSSH πŸ”₯

The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.

Versions 8.5p1 to 9.8p1 ​​are affected, and versions <4.4p are also potentially vulnerable.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/ySN3C
πŸ‘‰πŸ» Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)

Read more: https://www.qualys.com/regresshion-cve-2024-6387/
πŸ”₯3πŸ‘Ύ3πŸ‘2πŸ€”2
CVE-2024-39931: Argument Injection in Gogs, 9.9 rating πŸ”₯

The vulnerability published by SonarSource allows an attacker to delete or edit files/code stored on a vulnerable Gogs server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/adMql
πŸ‘‰ Dork: http.meta:"content=\"Gogs"

Read more: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
πŸ”₯4πŸ‘Ύ3πŸ‘2
CVE-2024-39929: Bypass of attachment verification in Exim❗

Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/gRdtH
πŸ‘‰ Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"

Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
πŸ”₯5πŸ‘2πŸ‘Ύ2
CVE-2024-5441: Arbitrary file uploads in Modern Events Calendar (WordPress plugin), 8.8 rating❗️

The vulnerability allows an attacker to upload any file to the server of the affected site, which makes RCE possible. According to Wordfence, hackers are already trying to exploit this vulnerability.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/aC1J0
πŸ‘‰πŸ» Dork: http.body:"plugins/modern-events-calendar"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/id/0c007090-9d9b-4ee7-8f77-91abd4373051?source=cve
πŸ‘Ύ5πŸ‘4πŸ”₯3
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating πŸ”₯

The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/HvsUY
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
πŸ‘4πŸ‘Ύ4πŸ”₯3
Complete Guide on Attack Surface Discovery πŸ”

Check out our latest article detailing the steps a cybersecurity researcher can follow to construct an Attack Surface using Netlas.io and other tools. Don't miss it! πŸ”₯

πŸ‘‰πŸ» Read now: https://netlas.io/blog/attack_surface_discovery_guide/
πŸ”₯5πŸ‘Ύ5🍾1
CVE-2024-34102: XXE in Magento (and Adobe Commerce), 9.8 rating πŸ”₯

Adobe eCommerce services are vulnerable to XXE, which allows an attacker to achieve arbitrary code execution. Cases of exploitation in the wild are already known❗

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/6inQC
πŸ‘‰ Dork: tag.name:"magento"

Vendor's advisory
: https://helpx.adobe.com/security/products/magento/apsb24-40.html
πŸ”₯5πŸ‘Ύ5πŸ‘4
Best Attack Surface Visualization Tools πŸ—Ί

Visualization of the Attack Surface is the final stage in its discovery. In this article we will talk about tools that can make this process easier πŸ”

πŸ‘‰ Read now: https://netlas.io/blog/best_attack_surface_visualization_tools/
πŸ‘Ύ5πŸ”₯3πŸ‘2⚑1🫑1
Mastering Online Cameras Searching πŸ“Ή

Intrigued by global events? Live cameras offer a solution. Millions of Internet-connected devices worldwide provide real-time views of live events, like public gatherings and conflictsπŸ’₯

IoT search engines, Google dorking, and niche websites: learn how to search online cameras around the world πŸ”Ž

πŸ‘‰ Read now: https://netlas.io/blog/find_online_cameras/
πŸ‘7❀1πŸ“1πŸ‘Ύ1
πŸš€ Netlas v.0.24.1 is live!

Our Attack Surface Discovery Tool now supports batch node addition and drag-and-drop for easier grouping. Plus, we’ve added a system theme property to control the dark/light mode.

Changelog is here: https://docs.netlas.io/changelog/
πŸ”₯3πŸ‘2πŸ‘Ύ2❀1
CVE-2024-37287: RCE in Kibana, 9.9 rating πŸ”₯

Recent vulnerability affecting multiple versions of Kibana allows an attacker to execute arbitrary code via prototype pollution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/EQIov
πŸ‘‰ Dork: http.favicon.hash_sha256:30db4185530d8617e9f08858787a24b219ac5102321b48515baf5da7ac43b590

Read more: https://discuss.elastic.co/t/kibana-8-14-2-7-17-23-security-update-esa-2024-22/364424
πŸ”₯5πŸ‘Ύ2
CVE-2024-43044, -43045: Arbitrary file read in Jenkins, critical rating πŸ”₯

The vulnerabilities allow an attacker to perform RCE or gain access to sensitive information.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/BEFsW
πŸ‘‰ Dork: http.favicon.hash_sha256:4fec1ee82f0dc4a8e4e9bb26954cf54cf9bf1e6a009516cb6c49ff16924e8caa

Vendor's advisory: https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430
πŸ‘Ύ4πŸ”₯3πŸ‘2
CVE-2024-22116: RCE in Zabbix, 9.9 rating πŸ”₯

Lack of escaping for script parameters allows an attacker to execute arbitrary code.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/KoYW4
πŸ‘‰ Dork: http.favicon.hash_sha256:22b06a141c425c92951056805f46691c4cd8e7547ed90b8836a282950d4b4be2

Vendor's advisory: https://support.zabbix.com/browse/ZBX-25016
πŸ”₯4πŸ‘Ύ3πŸ‘1
WordPress Automatic Exploit by Chirag ArtaniπŸ”₯

Our good friend’s channel posted a useful video about using Netlas to find real vulnerabilities 🀝

We also recommend checking out his website and Twitter for more tips:

πŸ‘‰ Site: 3rag.com
πŸ‘‰ Twitter: x.com/Chirag99Artani
πŸ”₯5πŸ‘2
CVE-2024-39397: Arbitrary Code Execution in Magento (and Adobe Commerce), 9.0 rating πŸ”₯

The latest vulnerability, affecting only Apache servers, allows an attacker to upload files with dangerous types and achieve code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/dw1Nl
πŸ‘‰ Dork: tag.name:"magento" AND http.headers.server:"Apache"

Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb24-61.html
πŸ”₯4πŸ‘Ύ2πŸ‘1
CVE-2024-33533, -33535, -33536: Multiple vulns in Zimbra, 5.4 - 7.5 rating❗️

The vulnerabilities could allow an attacker to perform path traversal or create XSS injection, which could compromise sensitive data.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/0aGwL
πŸ‘‰ Dork: http.favicon.hash_sha256:1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637 OR \*.banner:"Zimbra"

Vendor's advisory: https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.8#Security_Fixes
πŸ‘Ύ5πŸ”₯4
CVE-2024-5932: Deserialization of Untrusted Data in GiveWP plugin, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

Vulnerability discovered in the popular donation plugin leaves thousands of WordPress sites vulnerable to RCE and arbitrary file deletion.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/xS1vx
πŸ‘‰ Dork: http.body:"plugins/give/assets/dist"
πŸ”₯4πŸ‘Ύ4πŸ‘1
CVE-2024-40766: Improper Access Control in SonicWall SonicOS, 8.6 rating❗️

An improper access control vulnerability in the SonicOS admin interface could allow an attacker to access sensitive information and even execute arbitrary code on an affected device.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/WTQRf
πŸ‘‰ Dork: http.headers.server:"sonicwall"

Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015
1❀2πŸ”₯2πŸ‘Ύ2πŸ‘1
CVE-2024-8073: Command Injection in Hillstone Networks Firewalls, 9.8 rating πŸ”₯

The freshest vulnerability in Hillstone WAFs allows an attacker to perform RCE due to incorrect input validation.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/YZWqU
πŸ‘‰ Dork: http.title:"Hillstone Networks"

Vendor's advisory: https://www.hillstonenet.com.cn/security-notification/2024/08/21/mlzrld-2/
πŸ‘2πŸ”₯2πŸ‘Ύ1
CVE-2024-6386: RCE in WPML WordPress Plugin, 9.9 rating πŸ”₯

Due to the lack of input validation, an attacker can execute code on the affected server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/caxUk
πŸ‘‰ Dork: http.body:"plugins/wpml"

Read more: https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/
1πŸ”₯6πŸ‘3πŸ‘Ύ3
CVE-2024-43425: RCE in Moodle, PoC is available πŸ”₯πŸ”₯πŸ”₯

Due to incomplete sanitization in the β€œcalculated questions” feature, attackers can transmit and execute arbitrary code, which can be used to disclose students’ confidential information or disrupt the entire learning process.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/6WaFx
πŸ‘‰ Dork: http.headers.set_cookie:"MoodleSession"

Read more: https://blog.redteam-pentesting.de/2024/moodle-rce/
πŸ”₯4πŸ‘3πŸ‘Ύ3πŸ€“1