We have released a new tool, MANTILLA, a powerful tool for malware analysis and vulnerability detection of libraries in statically-linked (and stripped) Linux binaries. Read our latest blog post to learn more! (full paper here: https://doi.org/10.1016/j.future.2024.107602) https://reversea.me/index.php/identifying-runtime-libraries-in-statically-linked-binaries-with-mantilla/
🔥6
Citrix-Virtual-Apps-XEN-Exploit: Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE #Citrix #VirtualApps #XEN #Exploit #RCE https://github.com/watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit
GitHub
GitHub - watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit: Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE - watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight #RubySAML #CVE202445409 #SecurityFlaw #WorstCaseScenario #OpenSourceVulnerability https://workos.com/blog/ruby-saml-cve-2024-45409
Workos
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight — WorkOS
On September 10th, 2024, a critical security flaw was disclosed in the Ruby-SAML and OmniAuth-SAML libraries, exposing a vulnerability that allows complete authentication bypass. This flaw, CVE-2024-45409, earned the highest possible score of 10 on GitHub's…
The cost of a NAND chip off attack is 170.87€ #NANDchip #hardwareattack #170.87€ #toolsused #vulnerabilities https://www.errno.fr/NAND_chip_off_attack
Attestations: A new generation of signatures on PyPI #PyPI #Attestations #PEP740 #Sigstore #SoftwareSecurity https://blog.trailofbits.com/2024/11/14/attestations-a-new-generation-of-signatures-on-pypi/
The Trail of Bits Blog
Attestations: A new generation of signatures on PyPI
For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These attestations improve on traditional PGP signatures (which have been…
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575 # FortiManager # Vulnerability # Fortinet # FortiJump # CVE-2024-47575 https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/
watchTowr Labs
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
It’s been a tricky time for Fortinet (and their customers) lately - arguably, even more so than usual. Adding to the steady flow of vulnerabilities in appliances recently was a nasty CVSS 9.8 vulnerability in FortiManager, their tool for central management…
The Definitive Guide to Linux Process Injection #LinuxProcessInjection #SecurityResearch #LinuxvsWindows #RemoteProcessInteractions #PtraceProcfsProcess_VMWritv https://www.akamai.com/blog/security-research/the-definitive-guide-to-linux-process-injection
Akamai
The Definitive Guide to Linux Process Injection | Akamai
In this blog post, we document Linux process injection techniques, and explain how to detect and mitigate them.
Windows Drivers Reverse Engineering Methodology #WindowsSecurity #WindowsDrivers #ReverseEngineering https://voidsec.com/windows-drivers-reverse-engineering-methodology/
VoidSec
Windows Drivers Reverse Engineering Methodology
Methodology for reverse engineering Windows drivers, finding vulnerabilities and understanding their exploitability.
🔥4
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers #LaburityResearch #NPM #AccountTakeovers #SupplyChainSecurity #ResearchCaseStudy https://laburity.com/research-npm-account-takeovers/
Laburity - Cyber Security Services
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers - Laburity
Software supply chains are complex ecosystems where even a single vulnerability can lead to widely spread security issues. This blog focuses on supply chain account takeovers, particularly in NPM packages, and explains how attackers exploit expired email…
OpenBMC Remote OS Deployment: A Simplified Approach #OpenBMC #RemoteOS #Deployment #SimplifiedApproach #VaultLabs https://hardenedvault.net/blog/2024-11-17-openbmc-remote-deployment/
hardenedvault.net
OpenBMC Remote OS Deployment: A Simplified Approach
OpenBMC Remote OS Deployment: A Simplified Approach Many BMC implementations can accept a disk image and present it as a read-only USB mass storage device inserted into the host machine, allowing the host machine to boot from this “disk” for remote installation…
Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474 #PaloAlto #SSLVPN #Vulnerabilities #CVE2024 #CommandInjection https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/
watchTowr Labs
Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474
It'll be no surprise that 2024, 2023, 2022, and every other year of humanities' existence has been tough for SSLVPN appliances.
Anyhow, there are new vulnerabilities (well, two of them) that are being exploited in the Palo Alto Networks firewall and SSLVPN…
Anyhow, there are new vulnerabilities (well, two of them) that are being exploited in the Palo Alto Networks firewall and SSLVPN…
RpcInvestigator: Exploring RPC interfaces on Windows #WindowsRPC #RPCInvestigator #WindowsSecurity #ETW #RPCClient https://github.com/trailofbits/RpcInvestigator
GitHub
GitHub - trailofbits/RpcInvestigator: Exploring RPC interfaces on Windows
Exploring RPC interfaces on Windows. Contribute to trailofbits/RpcInvestigator development by creating an account on GitHub.
RustiveDump: LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). #RustiveDump #LSASS #MemoryDumper #NTAPIs #XOREncryption https://github.com/safedv/RustiveDump
GitHub
GitHub - safedv/RustiveDump: LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode…
LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission. - safedv/RustiveDump
Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474) #PANOS #ManagementInterface #RCE #CVE-2024-0012 #GitHubPullRequest https://github.com/rapid7/metasploit-framework/pull/19663
GitHub
Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474) by sfewer-r7 · Pull Request #19663 ·…
This pull request adds an exploit module for the recent PAN-OS management interface unauthenticated RCE exploit chain (CVE-2024-0012 + CVE-2024-9474), based upon the technical analysis published by...
In our latest blog post we delve into the adolescence of malware in the 2000s. We cover the rise of self-replicating worms, the impact of ILOVEYOU, Slammer, Conficker, and more. #MalwareHistory #2000sWorms #CybersecurityResearch #RME Read it now: https://reversea.me/index.php/a-brief-history-of-malware-part-4/
🔥1
Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild #Remediation #CVE2024 #CriticalBugs #Exploitable #Protection https://blog.securelayer7.net/coldfusion-path-traversal-and-weblogic-unauthenticated-rce-remediation/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild
CVE-2024-20767- ColdFusion Path Traversal can lead to reading important data. CVE-2024-20767 is a vulnerability in ColdFusion versions 2023.6, 2021.12, and earlier. These versions are affected by...
Fortune 1000 at risk: How we discovered 30k exposed APIs & 100k API vulnerabilities in the world’s largest organizations #Fortune1000 #APISecurity #Vulnerabilities #EscapePlatform #APIAudit https://escape.tech/blog/fortune-1000-at-risk-30k-exposed-apis-100k-vulnerabilities/
Escape DAST - Application Security Blog
Fortune 1000 at risk: How we discovered 100k vulnerabilities
Discover the alarming state of API security in Fortune 1000 and CAC 40. Escape's latest research reveals 2k high-risk vulnerabilities
Azure Detection Engineering: Log idiosyncrasies you should know about #AzureDetectionEngineering #LogIdiosyncrasies #SecurityCanaries #AzureLogs #DetectingIntrusions https://tracebit.com/blog/azure-detection-engineering-log-idiosyncrasies-you-should-know-about
Tracebit
Azure Detection Engineering: Log idiosyncrasies you should know about | Tracebit
We share a few inconsistencies found in Azure logs which make detection engineering more challenging.
Leveraging An Order of Operations Bug to Achieve RCE in Sitecore 8.x - 10.x #Assetnote #SecurityResearch #Sitecore #OrderOfOperations #AttackVector https://www.assetnote.io/resources/research/leveraging-an-order-of-operations-bug-to-achieve-rce-in-sitecore-8-x---10-x
www.assetnote.io
Leveraging An Order of Operations Bug to Achieve RCE in Sitecore 8.x - 10.x
Local file disclosure in Sitecore 8.x to 10.x that can lead to RCE (CVE-2024-46938) due to an order of operations bug within a handler responsible for reading local files.
Prototype Pollution in NASAs Open MCT CVE-2023-45282 #PrototypePollution #NASAOpenMCT #CVE2023-45282 #VisionSpace #JavaScriptVulnerability https://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/
Visionspace
Prototype Pollution in NASAs Open MCT CVE-2023-45282
The Prototype Pollution vulnerability is specific to the JavaScript programming language. It enables an attacker to add or alter any properties of global object prototypes. Once the property is changed, the code that inherits it will use the injected property…