UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.1K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from DailyCVE
πŸ”΅Nessus Agent: Multiple vulnerabilities:

(DC: 275-2021)

https://dailycve.com/nessus-agent-multiple-vulnerabilities
Forwarded from DailyCVE
πŸ”΅IBM Cloud Pak: Multiple vulnerabilities:

(DC: 276-2021)

https://dailycve.com/ibm-cloud-pak-multiple-vulnerabilities
Forwarded from DailyCVE
πŸ”΅eSOMS Telerik: Multiple vulnerabilities :

(DC: 276-2021)

https://dailycve.com/esoms-telerik-multiple-vulnerabilities
Forwarded from DailyCVE
πŸ”΅shescape command injection vulnerability:

(DC: 277-2021)

https://dailycve.com/shescape-command-injection-vulnerability
Forwarded from UNDERCODE NEWS
The launch of the Russian "Soyuz" rocket has been postponed due to a problem, but it will still take 38 satellites into orbit.
#Technologies
Forwarded from UNDERCODE NEWS
According to rumors, the British government is in talks with SpaceX about deploying Starlink broadband in rural areas.
#Technologies
Forwarded from UNDERCODE TESTING
πŸ”΅Wiki.js security vulnerability:

(DC: 277-2021)

https://dailycve.com/wikijs-security-vulnerability
Forwarded from UNDERCODE TESTING
The supply of certain chips made with mature processes would increase, according to Qualcomm CEO.
#International

View More Details - https://undercodenews.com/the-supply-of-certain-chips-made-with-mature-processes-would-increase-according-to-qualcomm-ceo/20/03/2021/
Forwarded from UNDERCODE TESTING
New electrochromic materials can quickly change color through power switching .
#Technologies

View More Details - https://undercodenews.com/new-electrochromic-materials-can-quickly-change-color-through-power-switching/20/03/2021/
Forwarded from UNDERCODE TESTING
πŸ”΅Apache Ambari arbitrary file download vulnerability :

(DC: 278-2021)

https://dailycve.com/apache-ambari-arbitrary-file-download-vulnerability
UNDERCODE TESTING
πŸ”΅Apache Ambari arbitrary file download vulnerability : (DC: 278-2021) https://dailycve.com/apache-ambari-arbitrary-file-download-vulnerability
Such exploit methods can be useful for pentesting other platforms


This vulnerability is mainly due to the use of "String requestURI =
httpRequest.getRequestURI();" in the authentication filter
(org.apache.ambari.server.security.authorization.AmbariAuthorizationFilter):

@Overridepublic void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {
HttpServletRequest httpRequest = (HttpServletRequest) request;
HttpServletResponse httpResponse = (HttpServletResponse) response;

String requestURI = httpRequest.getRequestURI();

SecurityContext context = getSecurityContext();

Authentication authentication = context.getAuthentication();

AuditEvent auditEvent = null;
....
}

Because when the web server processes the request, when accessing a
path like "/everyone-has-permission-path/..;/admin-has-permission-path",
the web server will return the resource "admin-has-permission- path",
but "httpRequest.getRequestURI()" in the filter will return the path
"/everyone-has-permission-path/..;/admin-has-permission-path", so in
the following code Will result in permission to pass the match:

@Override
public void doFilter(ServletRequest request, ServletResponse
response, FilterChain chain) throws IOException, ServletException {
...
if (authentication == null || authentication instanceof
AnonymousAuthenticationToken) {
...
}
if (authentication == null || authentication instanceof
AnonymousAuthenticationToken ||
!authentication.isAuthenticated()) {
...
} else if (!authorizationPerformedInternally(requestURI)) {
boolean authorized = false;

if (requestURI.matches(API_BOOTSTRAP_PATTERN_ALL)) {
authorized = AuthorizationHelper.isAuthorized(authentication,
ResourceType.CLUSTER,
null,
EnumSet.of(RoleAuthorization.HOST_ADD_DELETE_HOSTS));
}
else {
...
}

...
}
...
}

In fact, when I need to access the api under "/users.*", I only need
to use "/bootstrap/..;/users" to bypass certain authentication checks.

Of course, the APIs under "users.*" may require certain permissions to
access, but this is just an example, which means that in this way, you
will be able to bypass the authentication check to access other APIs
that require authentication to access.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from DailyCVE
πŸ”΅Utimaco SecurityServer security vulnerabilities:

(DC: 279-2021)

https://dailycve.com/utimaco-securityserver-security-vulnerabilities
Forwarded from DailyCVE
πŸ”΅Johnson Controls exacqVision: Access privileged data - Remote/unauthenticated:

(DC: 280-2021)

https://dailycve.com/johnson-controls-exacqvision-access-privileged-data-remoteunauthenticated
Forwarded from UNDERCODE NEWS
The owner of "Beeline" reduced the number of his staff by 11 times.
#International
Forwarded from UNDERCODE NEWS
Facebook, iOS, and Android also have a physical security key feature.
#Updates
Forwarded from UNDERCODE NEWS
On the 23rd, OnePlus teases the arrival of game trigger attachments with the OnePlus 9R 5G.
#Technologies
Forwarded from UNDERCODE NEWS
Google Pixel 5a, new details emerge thanks to Android 12.
#Technologies
Forwarded from DailyCVE
πŸ”΅Vscode-shellcheck security vulnerability:

(DC: 281-2021)

https://dailycve.com/vscode-shellcheck-security-vulnerability