Netlas.io
2.02K subscribers
343 photos
3 videos
467 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating ๐Ÿ”ฅ

Weak security hash verification vulnerability allows an attacker to gain administrative privileges.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/A60iV
๐Ÿ‘‰ Dork: http.body:"plugins/litespeed-cache"

Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
๐Ÿ‘พ5๐Ÿ‘3๐Ÿ”ฅ3
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating ๐Ÿ”ฅ

Due to an error, the server can process a request even if the connection should have been closed.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/VYS9t
๐Ÿ‘‰ Dork: http.headers.server:"waitress"

Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
๐Ÿ‘พ4๐Ÿ”ฅ3๐Ÿ‘2
CVE-2024-46538: XSS in pfSense, 9.3 rating ๐Ÿ”ฅ

XSS injection allows an attacker to perform arbitrary code execution in the user's browser. The vulnerability is not the freshest, but now it has a PoC!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/BuwaN
๐Ÿ‘‰ Dork: http.title:"pfSense - Login"

Vendor's advisory: https://redmine.pfsense.org/issues/15778
๐Ÿ”ฅ4๐Ÿ‘3๐Ÿ‘พ3
๐Ÿšง Planned Maintenance ๐Ÿšง
The application will be unavailable for a period of timeโ—๏ธ

The maintenance is scheduled to start on November 6, 2024, at 08:00 UTC โฐ. It is expected to take about an hour, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
๐Ÿ‘Ž2๐Ÿ‘พ2๐Ÿ˜ด1
Reminder: The maintenance begins in one hour. Netlas will be temporarily offline. We apologize for any inconvenience caused.
๐Ÿ‘Œ3
๐Ÿ’ฏ Planned Maintenance completed ๐Ÿ’ฏ

Netlas.io is online again and you can get back to your projects! ๐Ÿ‘พ
๐Ÿ”ฅ4๐Ÿ‘พ4
Smart Recon to PWN the Panel with Netlas.io ๐Ÿ”ฅ

There's nothing we enjoy more than seeing Netlas in action, uncovering real vulnerabilities. This time, we're excited to share a write-up from Rood Space!

๐Ÿ‘‰ Read it now: https://ro0od.medium.com/smart-recon-to-pwn-the-panel-a23b0b9466bb
๐Ÿ‘‰ Check author's TG: @alien_rood
๐Ÿ‘พ4โค3๐Ÿ”ฅ3
๐Ÿšง Planned Maintenance ๐Ÿšง
The application will be unavailable for a period of timeโ—๏ธ

The maintenance is scheduled to start on November 10, 2024, at 08:00 UTC โฐ. It is expected to take about an hour, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
๐Ÿ‘1
CVE-2024-42509: RCE in Aruba, 9.8 rating ๐Ÿ”ฅ

The vulnerability allows an attacker to perform RCE by sending specially crafted packets.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/Q71sc
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04722en_us&docLocale=en_US
๐Ÿ”ฅ5๐Ÿคฏ3๐Ÿ‘1๐Ÿ‘พ1
PAN-SA-2024-0015: RCE in Palo Alto PAN-OS ๐Ÿ”ฅ

In a recent advisory from Palo Alto, developers warn about the emergence of an RCE vulnerability. Administrators of potentially vulnerable devices are advised to take action as quickly as possible to minimize the damage.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/UdzF8
๐Ÿ‘‰ Dork: http.body_sha256:"7bc15a9ba71464596444ad648fa144937b848b302459c4103deae105cf42ce42" OR http.favicon.hash_sha256:a03ff6778b0535b9c4388e88c674eeeac91c0cc4b25bd23bf30f8d0bd98ac854

Vendor's advisory: https://security.paloaltonetworks.com/PAN-SA-2024-0015
2๐Ÿ‘พ5๐Ÿ”ฅ3
CVE-2024-45763 and other: Multiple vulnerabilities in Dell Sonic OS, 9.0 - 9.1 rating ๐Ÿ”ฅ

Some Sonic OS entities are vulnerable to OS Command Injection. Additionally, the vulnerabilities include a weakness in the authentication process that could allow a remote attacker to gain unauthorized access.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/TAX1W
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:d39342cbe7b9717529eb07f697779c55cdae7e0fc26c9672f64c49cbd8411eea

Vendor's advisory: https://www.dell.com/support/kbdoc/en-us/000245655/dsa-2024-449-security-update-for-dell-enterprise-sonic-distribution-vulnerabilities
๐Ÿ”ฅ3๐Ÿ‘พ3๐Ÿ‘2
CVE-2024-39710 and other: Multiple vulnerabilities in Ivanti Connect Secure, 4.4 - 9.1 rating ๐Ÿ”ฅ

Lots (25!) of vulnerabilities in the latest Ivanti bulletin. DoS, RCE, Auth Bypass - vulnerabilities on every taste.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/v0fEW
๐Ÿ‘‰ Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US
๐Ÿ”ฅ2๐Ÿ‘พ2๐Ÿ‘1
CVE-2024-52301: Improper Input Validation in Laravel Framework, 8.7 ratingโ—๏ธ

The vulnerability allows an attacker to change environment using a special crafted query string.

More then 830k instances at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/CDJgv
๐Ÿ‘‰ Dork: http.headers.set_cookie:"laravel_session="

Vendor's advisory: https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h
๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ‘พ1
Automated search for sites by favicon ๐Ÿ”

When mapping an attack surface or searching for vulnerable web interfaces, favicon matching often plays a critical role. Some IoT search engines, such as Shodan or Netlas, already offer this functionality.

However, today we want to introduce a tool that simplifies this process, developed by a member of the Netlas community. This utility supports searching for favicons across several search engines, including Shodan, Netlas, ZoomEye, and more.

Introducing FAVICORN โ€“ a collaborative creation by @soxoj, @seelwersowl, and @osint_mindset ๐Ÿฆ„

๐Ÿ‘‰ FAVICORN's GitHub: https://github.com/sharsil/favicorn
1๐Ÿ‘พ4๐Ÿ‘2๐Ÿ‘2
CVE-2024-52316, -52317, -52318: Multiple vulnerabilities in Apache Tomcat, 6.1 - 9.8 rating ๐Ÿ”ฅ

Three new vulnerabilities, including Auth Bypass, XSS injection, and Inadequate Encryption Strength, could pose a threat to thousands of web services.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/dbwDi
๐Ÿ‘‰ Dork: http.title:"Apache Tomcat"

Vendor's advisory: https://lists.apache.org/thread/dokwlz7k57sgphfj3ko36vn8xrys3o6r
๐Ÿ”ฅ4๐Ÿ‘พ2
Minor App Improvements

In update 1.0.3, we've introduced several features to enhance the payment experience.

Hereโ€™s whatโ€™s new:
๐Ÿ“” Added a Payment Guide
๐Ÿ“Œ Clarified subscription options for the Freelancer tier
๐Ÿ–ฅ A few other minor improvements

๐Ÿ‘‰ Read more: https://docs.netlas.io/changelog/
๐Ÿ‘พ3๐Ÿ‘1
PAN-OS RCE PoC by Chirag Artani ๐Ÿ”ฅ

Our friendโ€™s channel posted another interesting video about one of the latest vulnerabilities, where he demonstrated Proof of Concept using Netlas ๐Ÿ”

We also recommend checking out his website and Twitter for more tips:

๐Ÿ‘‰ Site: 3rag.com
๐Ÿ‘‰ Twitter: x.com/Chirag99Artani
1๐Ÿ‘พ6๐Ÿ‘2
Netlas and Shodan: Comprehensive Analysis ๐Ÿงฎ

With Netlas recently emerging from beta and reaching version 1.0, we felt it was the perfect time to conduct a comprehensive comparison with its competitors.

Weโ€™ve started with one of the toughest challenges: an in-depth, objective comparison of Netlas and the veteran in the field, Shodan. Using over 10 key indicators, weโ€™ve analyzed both platforms to help you understand pros and cons of the two solutions.

๐Ÿ‘‰ Read now: https://netlas.io/blog/netlas_vs_shodan/
1๐Ÿ”ฅ6๐Ÿ‘พ2
CVE-2024-48990 and other: Multiple vulnerabilities in Needrestart utility for Ubuntu (including Ubuntu Server), 5.3 - 7.8 ratingโ—๏ธ

Five vulnerabilities discovered by researchers from Qualys allow LPE to be carried out on machines running Ubuntu OS and gain root rights.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/ZhaO6
๐Ÿ‘‰ Dork: http.headers.server:"Ubuntu"

Read more: https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
๐Ÿ‘พ4๐Ÿ”ฅ3๐Ÿ‘2
๐Ÿšง Planned Maintenance ๐Ÿšง
The application will be unavailable for a period of timeโ—๏ธ

The maintenance is scheduled to start on November 24, 2024, at 08:00 UTC โฐ. It is expected to take a couple of hours, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
๐Ÿ‘พ4๐ŸŒš1๐Ÿ—ฟ1
Blind Spot in the Fortinet VPNs, no CVEโ—๏ธ

Researchers from Pentera have discovered a potential vulnerability in Fortinet VPNs, probably allowing an attacker to hide the fact that a brute force attack was successfully completed.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/zJEUh
๐Ÿ‘‰ Dork: http.body_sha256:"6e24d74ebc881e1e97331bb72d6edee8431485a8a0cafd7c4a913a3819817b84"

Read more: https://pentera.io/blog/FortiClient-VPN_logging-blind-spot-revealed/
๐Ÿ”ฅ4๐Ÿ‘พ3