Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-afr-UtjfO2D7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Nexus%209000%20Series%20Fabric%20Switches%20ACI%20Mode%20Arbitrary%20File%20Read%20Vulnerability&vs_k=1
A vulnerability in the fabric infrastructure file system access control of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected system.
This vulnerability is due to improper access control. An attacker with Administrator privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to read arbitrary files on the file system of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-afr-UtjfO2D7
This advisory is part of the August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication (https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74640).
Security Impact Rating: Medium
CVE: CVE-2021-1583
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-afr-UtjfO2D7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Nexus%209000%20Series%20Fabric%20Switches%20ACI%20Mode%20Arbitrary%20File%20Read%20Vulnerability&vs_k=1
A vulnerability in the fabric infrastructure file system access control of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected system.
This vulnerability is due to improper access control. An attacker with Administrator privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to read arbitrary files on the file system of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-afr-UtjfO2D7
This advisory is part of the August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication (https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74640).
Security Impact Rating: Medium
CVE: CVE-2021-1583
Cisco
Cisco Security Advisory: Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability
A vulnerability in the fabric infrastructure file system access control of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected system.…
Parches para dispositivos F5 BIG-IP y BIG-IQ Devices
https://blog.segu-info.com.ar/2021/08/parches-para-dispositivos-f5-big-ip-y.html
https://blog.segu-info.com.ar/2021/08/parches-para-dispositivos-f5-big-ip-y.html
Segu-Info - Ciberseguridad desde 2000
Parches para dispositivos F5 BIG-IP y BIG-IQ Devices
ExploitDB Just tweeted ****************************************** [webapps] CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) https://t.co/rDNXpbVivL
Exploit Database
CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated)
CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated).. webapps exploit for Multiple platform
MSSQL for Pentester: Command Execution with Ole Automation https://www.hackingarticles.in/mssql-for-pentester-command-execution-with-ole-automation/
Hacking Articles
MSSQL for Pentester: Command Execution with Ole Automation
Learn how to enable and exploit OLE Automation in MSSQL for command execution with Metasploit and PowerUpSQL.
📃 "Cifrado por hardware unidades SSD (SED)" https://blog.elhacker.net/2021/07/cifrado-por-hardware-ssd-unidad-sed-nand.html
Blog elhacker.NET
Cifrado por hardware unidades SSD (SED)
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
https://github.com/optiv/Registry-Recon
https://github.com/optiv/Registry-Recon
GitHub
GitHub - optiv/Registry-Recon: Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon - optiv/Registry-Recon
[webapps] COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
https://www.exploit-db.com/exploits/50231
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
https://www.exploit-db.com/exploits/50231
Exploit Database
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow
COMMAX WebViewer ActiveX Control 2.1.4.5 - 'Commax_WebViewer.ocx' Buffer Overflow.. webapps exploit for Hardware platform
Snakeoil: 1
https://www.vulnhub.com/entry/snakeoil_1,738/
Recently, Good Tech Inc. has decided to change their application development process. However, their applications look broken and too basic. Is this an application full of snakeoil, or are they insecure too? This goes beyond PEN-200, and some web application development expertise could be helpful.
If you MUST have hints for this machine: SNAKEOIL is (#1): a hint by itself, (#2): full of disallowed methods, (#3): a single file full of problems.
VulnHub (https://www.vulnhub.com/)
https://www.vulnhub.com/entry/snakeoil_1,738/
Recently, Good Tech Inc. has decided to change their application development process. However, their applications look broken and too basic. Is this an application full of snakeoil, or are they insecure too? This goes beyond PEN-200, and some web application development expertise could be helpful.
If you MUST have hints for this machine: SNAKEOIL is (#1): a hint by itself, (#2): full of disallowed methods, (#3): a single file full of problems.
VulnHub (https://www.vulnhub.com/)
Vulnhub
digitalworld.local: snakeoil
digitalworld.local: snakeoil, made by Donavan. Download & walkthrough links are available.
#exploit
CVE 2021-36394:
Moodle RCE risk when Shibboleth authentication is enabled (PoC)
https://github.com/dinhbaouit/CVE-2021-36394
]-> https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu
CVE 2021-36394:
Moodle RCE risk when Shibboleth authentication is enabled (PoC)
https://github.com/dinhbaouit/CVE-2021-36394
]-> https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu
GitHub
GitHub - dinhbaouit/CVE-2021-36394
Contribute to dinhbaouit/CVE-2021-36394 development by creating an account on GitHub.