Netlas.io
2.03K subscribers
345 photos
3 videos
470 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
Netlas.io
๐Ÿ” Track Adversary Infrastructure Challenge Join the challenge by Netlas and RST Cloud to improve your threat-hunting skills. - Learn to detect C2 servers and investigate real threats. - Compete for prizes: ๐Ÿ† $1000, ๐Ÿฅˆ $500, ๐Ÿฅ‰ $250. - Top 10 winners receiveโ€ฆ
๐Ÿ‘พ Friendly Reminder ๐Ÿ‘พ

The Track Adversary Infrastructure Challenge is starting in two weeks! If you want to take part but haven't registered yet, do it ASAPโ—๏ธ

๐Ÿ‘‰ Read more about the competition: https://netlas.io/promo/ti-challenge/
๐Ÿ‘พ2๐Ÿฅฐ1
CVE-2025-3616: File Upload in Greenshift WordPress Plugin, 8.8 ratingโ—๏ธ

A vulnerability discovered by Wordfence researchers allows attackers to upload arbitrary files and execute them remotely.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/meWm0
๐Ÿ‘‰ Dork: http.body:"plugins/greenshift-animation-and-page-builder-blocks"

Read more: https://www.wordfence.com/blog/2025/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-greenshift-wordpress-plugin/
๐Ÿ”ฅ4๐Ÿ‘พ1
โ—๏ธTechnical Issue Alertโ—๏ธ

We're currently experiencing issues with data backups, which has temporarily taken the IP/Domain Info and Responses Search tools offline. We expect to have everything back up and running within the next 1โ€“2 hours.

Our team is working hard to resolve the issue as quickly as possible.

๐Ÿ‘‰ You can also follow the Netlas status on the corresponding page: https://status.netlas.io/

We sincerely apologize for the inconvenience and appreciate your patience ๐Ÿ™
๐Ÿ˜ญ2๐Ÿ’Š2
โœ… Service Restored ๐Ÿ› 

The restoration is nearly complete, and all tools are now back online. You can safely resume your work!

Thanks for bearing with us ๐Ÿ™Œ
๐Ÿฆ„3๐Ÿ”ฅ2
CVE-2025-1763, -2443 and other: Multiple vulns in GitLab, 4.3 - 8.7 ratingโ—๏ธ

In a recent advisory, GitLab shared information about several fixed vulnerabilities, including XSS, DoS, and Header Injection.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/XxMjv
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/04/23/patch-release-gitlab-17-11-1-released/
๐Ÿ”ฅ3๐Ÿ‘พ2
๐Ÿ“ข Incident update: Due to an issue reported yesterday, the most recent data was temporarily unavailable in search. The issue has been fixed, and all data is now up to date. Sorry for the inconvenience!
โค4
CVE-2025-32432: RCE in CraftCMS, 10.0 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

0-day vulnerability makes some versions of CraftCMS vulnerable to RCE. Used in the wild in combination with CVE-2024-58136.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/XVVPd
๐Ÿ‘‰ Dork: http.headers.x_powered_by:"Craft CMS"

Vendor's advisory: https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3
๐Ÿ”ฅ3๐Ÿ‘พ3๐Ÿ‘1
CVE-2025-31324: Unrestricted Upload of File in SAP NetWeaver, 10.0 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

A vulnerability in SAP NetWeaver Visual Composer Metadata Uploader allows an attacker to perform unauthenticated file uploads, including malicious ones.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/nCgfN
๐Ÿ‘‰ Dork: http.body:"This error page was generated by SAP Web Dispatcher!"

Read more: https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/
๐Ÿ”ฅ5๐Ÿ‘พ2
CVE-2023-44221 and CVE-2024-38475: Admin Hijack Exploit in SonicWall ๐Ÿ”ฅ

In a recent research, watchTowr Labs demonstrated a working exploit chain that leverages two old vulnerabilities and allows a remote attacker to take control of a SonicWall instance.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/5973o
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:6bb6f64adaa6a7ed4da10a2fe4edf4cb4d9914aa742c7ad607ca4ca678dcd3f1

Read more: https://labs.watchtowr.com/sonicboom-from-stolen-tokens-to-remote-shells-sonicwall-sma100-cve-2023-44221-cve-2024-38475/
๐Ÿ”ฅ4๐Ÿ‘พ2
CVE-2025-27007: Privilege Escalation in OttoKit WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

Errors in the logic of the plugin's API could potentially lead to an attacker gaining access to the administrator account. According to Patchstack, exploitation of the vulnerability began just an hour after public disclosure!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/y4FXX
๐Ÿ‘‰ Dork: http.body:"plugins/suretriggers"

Read more: https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve
๐Ÿ”ฅ3๐Ÿ‘พ2
CVE-2025-20188: Use of Hard-coded Credentials in Cisco IOS XE, 10.0 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

Due to hard-coded JWT, Cisco IOS XE instances may be vulnerable to arbitrary file uploads, path traversal, and arbitrary command execution. Catalyst controllers are primarily affected.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/BKkJI
๐Ÿ‘‰ Dork: certificate.issuer_dn:"IOS-Self-Signed-Certificate"

Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC
1๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ‘พ2
CVE-2025-31644: Command Injection' in F5 BIG-IP, 8.7 ratingโ—๏ธ

A vulnerability in the "file" parameter of the "save" command allows authenticated attackers to execute arbitrary commands as root.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/5WHZt
๐Ÿ‘‰ Dork: http.headers.server:"BigIP"

Vendor's advisory: https://my.f5.com/manage/s/article/K000148591
๐Ÿ‘พ4๐Ÿ”ฅ3
CVE-2025-42999: Deserialization of Untrusted Data in SAP NetWeaver, 9.1 rating ๐Ÿ”ฅ

A vulnerability in SAP NetWeaver Visual Composer Metadata Uploader allows a privileged attacker to upload arbitrary content that could compromise the confidentiality and integrity of the system.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/QzmGI
๐Ÿ‘‰ Dork: http.body:"This error page was generated by SAP Web Dispatcher!"

Read more: https://www.bleepingcomputer.com/news/security/sap-patches-second-zero-day-flaw-exploited-in-recent-attacks/
๐Ÿ‘พ3๐Ÿ”ฅ2
CVE-2025-22252: Bypass Authentication in FortiOS/FortiProxy, 9.0 rating ๐Ÿ”ฅ

Systems configured to use TACACS+ with ASCII authentication may be affected by a vulnerability that could allow an attacker to bypass authentication and gain administrative privileges.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/JYafs
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f

Vendor's advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-472
๐Ÿ”ฅ2๐Ÿ‘พ2
CVE-2025-47884, -47885, -47889: Multiple vulnerabilities in Jenkins, 8.8 - 9.8 rating ๐Ÿ”ฅ

Three vulnerabilities in Jenkins that were recently disclosed: Improper Access Control, XSS, Auth Bypass.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/6d5ql
๐Ÿ‘‰ Dork: http.headers.x_jenkins:*

Vendor's advisory: https://www.jenkins.io/security/advisory/2025-05-14/
๐Ÿ”ฅ3๐Ÿ‘พ2
Netlas vs. IPinfo: A Comprehensive Analysis ๐Ÿงฎ

Our latest article puts Netlas head-to-head with one of its indirect competitors, IPinfo.

Inside, youโ€™ll find:
- Deep dive into each toolโ€™s core features ๐Ÿ”
- Clear, side-by-side pricing comparison ๐Ÿ’ธ
- Actionable insights on where each platform shines ๐Ÿค”

๐Ÿ‘‰ Read the article here: https://netlas.io/blog/netlas_vs_ipinfo/
๐Ÿ‘พ3๐Ÿ”ฅ2๐Ÿ‘1
CVE-2024-57273, -54779, 54780: Multiple vulnerabilities in pfSense, 5.4 - 8.8 ratingโ—๏ธ

The three newly disclosed vulnerabilities include Stored XSS, Command Injection and XML Injection.
Since the details of the vulnerabilities have already been disclosed, we recommend that anyone involved update their software.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/DOmg1
๐Ÿ‘‰ Dork: http.title:"pfSense - Login"

Read more: https://blog.brillantit.com/exploiting-pfsense-xss-command-injection-cloud-hijack/
๐Ÿ‘พ4๐Ÿ‘2๐Ÿ”ฅ2
CVE-2025-22157: Improper Access Control in Atlassian Jira, 7.2 ratingโ—๏ธ

The vulnerability allows an authenticated attackers to escalate their privileges to administrator level or gain access to restricted workflows in Jira.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/lVuft
๐Ÿ‘‰ Dork: http.meta:"content=\"JIRA\""

Vendor's advisory: https://confluence.atlassian.com/security/security-bulletin-may-20-2025-1561365992.html
๐Ÿ‘พ4๐Ÿ‘2
๐Ÿšง Planned Maintenance ๐Ÿšง
The application will be unavailable for a period of timeโ—๏ธ

The maintenance is scheduled to start today at 09:00 UTC โฐ. It is expected to take about ten minutes, but may take up to half an hour. We will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
โค2๐Ÿ†’2๐Ÿ’Š1
๐Ÿ’ฏ Planned Maintenance Completed ๐Ÿ’ฏ

Our team apologizes that this process took longer than expected.
Netlas is fully online again, and you can get back to your projects! ๐Ÿ‘พ
๐Ÿ‘พ3๐Ÿ‘€2๐Ÿ˜ญ1
Netlas 1.2.0 is Live! ๐Ÿš€

What's new:

๐Ÿ“‘ OpenAPI 3.1 Support
๐Ÿ›  Docs Portal Rebuild
๐Ÿ”– Field types added in Mapping View
๐Ÿ•ต๏ธโ€โ™‚๏ธ New โ€œTrackerโ€ Node (Google Tags, Facebook Pixels) into Attack Surface Discovery tool

Dive into the full changelog ๐Ÿ‘‰ https://docs.netlas.io/changelog/
๐Ÿ”ฅ7