🦗CVE : CVE-2023-49070
CVE Series : #3
Apache OFBiz Pre-authentication RCE Vulnerability
• Type: Code injection (CWE-94)⚠️
• Affected Software: Apache OFBiz versions prior to 18.12.10
• CVSSv3 Base Score: 9.8 (Critical Severity)
Dive into the details 🧵:👇
https://x.com/vulncure/status/1733545000363819108?s=20
CVE Series : #3
Apache OFBiz Pre-authentication RCE Vulnerability
• Type: Code injection (CWE-94)⚠️
• Affected Software: Apache OFBiz versions prior to 18.12.10
• CVSSv3 Base Score: 9.8 (Critical Severity)
Dive into the details 🧵:👇
https://x.com/vulncure/status/1733545000363819108?s=20
🔥9👍2👏1
Bugbounty Reports in Thread🧵
Bug: Blind SQL injection on id\.indrive\.com
Type: SQL Injection
Program: inDrive
Siverity: Critical (9 ~ 10)
Bounty: $4,134
Dive into the details 🧵:📷
https://x.com/vulncure/status/1734908685103575408?s=20
Bug: Blind SQL injection on id\.indrive\.com
Type: SQL Injection
Program: inDrive
Siverity: Critical (9 ~ 10)
Bounty: $4,134
Dive into the details 🧵:📷
https://x.com/vulncure/status/1734908685103575408?s=20
❤12👍4🔥2🤡1
Guys we are taking a live session for Bug Hunter & Pentesters at Sun 16 dec IST.
Anonymous Poll
48%
Time : 9PM IST
52%
Time : 10PM IST
Note📌 : This Meet is going to be Simple & easy with normal day to day question in 🐛 bug hunter's life
Lang : Hindi
At 10PM IST Tomorrow { Telegram's Channel Meet }
Lang : Hindi
At 10PM IST Tomorrow { Telegram's Channel Meet }
😢15👍6🍾4😁3
Thank You Guys, So much for joining the Meet 🌿🍁
Special thanks 👍 To Our Team:
1. twitter.com/Anukulhexx
2. twitter.com/hack_learners
3. twitter.com/radhasec
4. twitter.com/TecholicKamal
5. twitter.com/RajNamdevv
For handling this Meet
Special thanks 👍 To Our Team:
1. twitter.com/Anukulhexx
2. twitter.com/hack_learners
3. twitter.com/radhasec
4. twitter.com/TecholicKamal
5. twitter.com/RajNamdevv
For handling this Meet
❤9👍1
PART 1
🍏 Let's Exploit the Nodejs Application :
https://x.com/vulncure/status/1736816422217527727?s=20
🍏 Let's Exploit the Nodejs Application :
https://x.com/vulncure/status/1736816422217527727?s=20
🔥7👍4👌1
PART 2 ⤵️
🍏 Exploit Nodejs Application To RCE
In Part 1, We talked about the Nodejs global process that can used to get better control over system interactions
We sawn that Nodejs Application wouldn't have sanitized the eval() .
Well, Now we'll deal with the file system of instance running Nodejs Application
Read More :
https://x.com/vulncure/status/1737169125267415403?s=20
🍏 Exploit Nodejs Application To RCE
In Part 1, We talked about the Nodejs global process that can used to get better control over system interactions
We sawn that Nodejs Application wouldn't have sanitized the eval() .
Well, Now we'll deal with the file system of instance running Nodejs Application
Read More :
https://x.com/vulncure/status/1737169125267415403?s=20
❤6😱1
🎉 Happy New Year Guys 🎊
Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed
All the Best 🥳
Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed
All the Best 🥳
❤23🎉4👍2👏2👀1
IDOR.pdf
78.5 KB
🔥31👍7⚡2👀1
2FA Bypass.pdf
301.4 KB
🔥25👍4❤3😁1
reset pass checklist.pdf
97.4 KB
❤14🔥6👍3🕊1
🚨Bounty Tips Collected From Twitter🚨.pdf
225.9 KB
❤🔥8🔥5👍4❤2👌2
PART - #1 🕵️♂️🛠
Let's Crack The Jenkins Instance 🔓
https://x.com/vulncure/status/1743241088968638513?s=20
Let's Crack The Jenkins Instance 🔓
https://x.com/vulncure/status/1743241088968638513?s=20
👍7🔥3⚡2🌭1
Some Shodan Dorks that might useful in Bug Bounty.
1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
🔥17❤5👍3👌3⚡2