Netlas.io
2.02K subscribers
343 photos
3 videos
467 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2024-49193: Email Spoofing in Zendesk πŸ”₯

Knowing the support email and ticket id, an attacker can view the entire history of the ticket, thus gaining access to sensitive data.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/dWuES
πŸ‘‰ Dork: http.unknown_headers.key:"x_zendesk_processed_host_header" OR http.unknown_headers.key:"x_zendesk_origin_server"

Read more: https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52
πŸ‘Ύ3πŸ‘2πŸ”₯2πŸ€”1
Critical vulnerability in Jetpack WordPress Plugin πŸ”₯

The vulnerability, fixed in the latest update, allowed registered users to read the forms of other site visitors, theoretically allowing access to sensitive information.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/hJKpB
πŸ‘‰ Dork: http.body:"plugins/jetpack"

Security bulletin: https://jetpack.com/blog/jetpack-13-9-1-critical-security-update/
πŸ”₯3πŸ‘Ύ3
CVE-2024-9634: RCE in GiveWP WordPress Plugin, 9.8 rating πŸ”₯

Another one critical vulnerability in GiveWP. This time, attackers can inject PHP code using one parameter.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/9tUYx
πŸ‘‰ Dork: http.body:"plugins/give/assets/dist"

Read more: https://github.com/advisories/GHSA-6fx6-wrpf-cpgv
πŸ”₯4πŸ‘Ύ3
CVE-2024-45216: Improper Authentication in Apache Solr, 9.8 rating πŸ”₯

Fake ending in Solr API URLs allows attackers to bypass authentication, which can lead to sensitive data leakage.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/x1SZG
πŸ‘‰ Dork: tag.name:"apache_solr"

Vendor's advisory: https://solr.apache.org/security.html#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending
πŸ”₯4πŸ‘Ύ2
CVE-2024-9264: Execute Arbitrary Code in Grafana, 9.9 rating πŸ”₯πŸ”₯πŸ”₯

Grafana users at Viewer level and above can perform command injection using a vulnerability in SQL Expressions.

More then 104k instances at Netlas.io:
πŸ‘‰ Link: https://nt.ls/oQJHO
πŸ‘‰ Dork: http.favicon.hash_sha256:80a7f87a79169cf0ac1ed3250d7c509368190a97bc7182cd4705deb8f8c70174 AND http.title:"Grafana"

Vendor's advisory: https://grafana.com/blog/2024/10/17/grafana-security-release-critical-severity-fix-for-cve-2024-9264/
πŸ”₯5πŸ‘Ύ2πŸ‘1
CVE-2024-20329: Improper Neutralization of Command Delimiters in Cisco ASA, 9.9 rating πŸ”₯πŸ”₯πŸ”₯

The vulnerability allows an attacker with low privileges to remotely execute commands via SSH and thus gain full control of the system.

More then 140k instances at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Rfjme
πŸ‘‰ Dork: http.body:"/+CSCOE+/logon.html"

Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF
πŸ”₯5πŸ‘3πŸ‘Ύ3
CVE-2024-45157: Credentials exposure in Rancher, 9.1 rating πŸ”₯

Due to a discovered vulnerability, Rancher stored vSphere CPI/CSI passwords as a plaintext object.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/9fDwE
πŸ‘‰ Dork: http.favicon.hash_sha256:2d7adbc74e7c8941927d04e702acbff577d219fef8617c8c3014d34ae395525b

Vendor's advisory: https://github.com/rancher/rancher/security/advisories/GHSA-xj7w-r753-vj8v
1πŸ‘Ύ4πŸ”₯3πŸ‘2
πŸ”₯ Netlas.io beta testing is finally over! πŸ”₯

In version 1.0, we've added a final touch β€” recurring payments to simplify the payment process for subscribers.

❓ How to enable recurring payments ❓

If you haven’t subscribed yet, simply select the "Recurring Payments" option at checkout.

If you're already a subscriber, wait until the end of your current billing period, then renew your subscription by choosing the "Recurring Payments" option.

πŸ‘‰ Read more in the changelog: https://docs.netlas.io/changelog/
1πŸ”₯4⚑2πŸ‘Ύ1
CVE-2024-46483: Integer Overflow in Xlight FTP Server, 9.8 rating πŸ”₯

By overflowing the variable, an attacker could cause remote code execution on the host or a denial of service.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/M8D2R
πŸ‘‰ Dork: \*.banner:"Xlight" OR raw_tcp.response_data:"Xlight"

Read more: https://github.com/kn32/cve-2024-46483
πŸ”₯6πŸ‘Ύ2πŸ‘1
CVE-2024-50388: OS Command Injection in QNAP NAS, critical rating πŸ”₯

A vulnerability exploited on Pwn2Own and affecting HBS 3 Hybrid Backup Sync allows attackers to carry out remote command execution.

More then 113k instances at Netlas.io:
πŸ‘‰ Link: https://nt.ls/MBHWB
πŸ‘‰ Dork: certificate.issuer_dn:"QNAP NAS" OR http.body_sha256:4a1815f3e87d6d623c22921d9c39b2de614351d71831976bbc807f571953ff21

Vendor's advisory: https://www.qnap.com/en-us/security-advisory/qsa-24-41
1πŸ‘Ύ6πŸ‘3πŸ”₯2
Pre-Auth RCE CyberPanel 0day by Chirag Artani πŸ”₯

Useful video from our friend's channel about one of the freshest big vulnerabilities with Netlas search πŸ”Ž

We also recommend checking out his website and Twitter for more tips:

πŸ‘‰ Site: 3rag.com
πŸ‘‰ Twitter: x.com/Chirag99Artani
πŸ”₯6πŸ‘Ύ4❀2
CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating πŸ”₯

Weak security hash verification vulnerability allows an attacker to gain administrative privileges.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/A60iV
πŸ‘‰ Dork: http.body:"plugins/litespeed-cache"

Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
πŸ‘Ύ5πŸ‘3πŸ”₯3
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating πŸ”₯

Due to an error, the server can process a request even if the connection should have been closed.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/VYS9t
πŸ‘‰ Dork: http.headers.server:"waitress"

Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
πŸ‘Ύ4πŸ”₯3πŸ‘2
CVE-2024-46538: XSS in pfSense, 9.3 rating πŸ”₯

XSS injection allows an attacker to perform arbitrary code execution in the user's browser. The vulnerability is not the freshest, but now it has a PoC!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/BuwaN
πŸ‘‰ Dork: http.title:"pfSense - Login"

Vendor's advisory: https://redmine.pfsense.org/issues/15778
πŸ”₯4πŸ‘3πŸ‘Ύ3
🚧 Planned Maintenance 🚧
The application will be unavailable for a period of time❗️

The maintenance is scheduled to start on November 6, 2024, at 08:00 UTC ⏰. It is expected to take about an hour, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
πŸ‘Ž2πŸ‘Ύ2😴1
Reminder: The maintenance begins in one hour. Netlas will be temporarily offline. We apologize for any inconvenience caused.
πŸ‘Œ3
πŸ’― Planned Maintenance completed πŸ’―

Netlas.io is online again and you can get back to your projects! πŸ‘Ύ
πŸ”₯4πŸ‘Ύ4
Smart Recon to PWN the Panel with Netlas.io πŸ”₯

There's nothing we enjoy more than seeing Netlas in action, uncovering real vulnerabilities. This time, we're excited to share a write-up from Rood Space!

πŸ‘‰ Read it now: https://ro0od.medium.com/smart-recon-to-pwn-the-panel-a23b0b9466bb
πŸ‘‰ Check author's TG: @alien_rood
πŸ‘Ύ4❀3πŸ”₯3
🚧 Planned Maintenance 🚧
The application will be unavailable for a period of time❗️

The maintenance is scheduled to start on November 10, 2024, at 08:00 UTC ⏰. It is expected to take about an hour, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
πŸ‘1
CVE-2024-42509: RCE in Aruba, 9.8 rating πŸ”₯

The vulnerability allows an attacker to perform RCE by sending specially crafted packets.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Q71sc
πŸ‘‰ Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04722en_us&docLocale=en_US
πŸ”₯5🀯3πŸ‘1πŸ‘Ύ1
PAN-SA-2024-0015: RCE in Palo Alto PAN-OS πŸ”₯

In a recent advisory from Palo Alto, developers warn about the emergence of an RCE vulnerability. Administrators of potentially vulnerable devices are advised to take action as quickly as possible to minimize the damage.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/UdzF8
πŸ‘‰ Dork: http.body_sha256:"7bc15a9ba71464596444ad648fa144937b848b302459c4103deae105cf42ce42" OR http.favicon.hash_sha256:a03ff6778b0535b9c4388e88c674eeeac91c0cc4b25bd23bf30f8d0bd98ac854

Vendor's advisory: https://security.paloaltonetworks.com/PAN-SA-2024-0015
2πŸ‘Ύ5πŸ”₯3