Pwning a Cisco RV340 with a 4 bug chain exploit as demonstrated in pwn2own competition.
https://blog.relyze.com/2022/04/pwning-cisco-rv340-with-4-bug-chain.html
https://blog.relyze.com/2022/04/pwning-cisco-rv340-with-4-bug-chain.html
Zero-Day in Nginx results in Remote Code Execution (RCE).
https://securityonline.info/nginx-zero-day-rce-vulnerability-alert/
https://securityonline.info/nginx-zero-day-rce-vulnerability-alert/
Daily CyberSecurity
Nginx Zero-Day LDAP Reference Implementation Vulnerability Alert
An nginx Zero-Day RCE issue was identified in the nginx LDAP-auth daemon implementation, which was briefly leaked.
🔧 Tool: A modern, simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection firewalls. That's all it does: no more, and no less.
https://github.com/ekzhang/bore
https://github.com/ekzhang/bore
GitHub
GitHub - ekzhang/bore: 🕳 bore is a simple CLI tool for making tunnels to localhost
🕳 bore is a simple CLI tool for making tunnels to localhost - ekzhang/bore
PoC: VMware CVE-2022-22954 Workspace ONE Access Freemarker Server-side Template Injection.
Originally mentioned here https://t.me/ckuRED/117 is the first public disclosure of the vulnerability
https://github.com/sherlocksecurity/VMware-CVE-2022-22954
Originally mentioned here https://t.me/ckuRED/117 is the first public disclosure of the vulnerability
https://github.com/sherlocksecurity/VMware-CVE-2022-22954
Telegram
cKure Red
Zero-Day in a Vmware product leads to unauthenticated remote code execution via Web interface.
Vmware is aware about the bug and is patching.
There is no patch to the Zero-Day. However, workarounds include use of WAF and disabling features.
Vmware is aware about the bug and is patching.
There is no patch to the Zero-Day. However, workarounds include use of WAF and disabling features.
Kernel RCE in FreeBSD via WiFi frames.
https://www.freebsd.org/security/advisories/FreeBSD-SA-22:07.wifi_meshid.asc
Also affects pfSense / OPNsense / etc.
https://www.freebsd.org/security/advisories/FreeBSD-SA-22:07.wifi_meshid.asc
Also affects pfSense / OPNsense / etc.
CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability.
https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-ios-asn1.html
https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-ios-asn1.html
projectzero.google
CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability
Posted by Ian Beer, Google Project Zero This blog post is my analysis of a vulnerability found ...
Zero-Day in Java: A researcher has released proof-of-concept (PoC) code for a digital signature bypass vulnerability in Java.
CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server.
https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server.
https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
GitHub
GitHub - notkmhn/CVE-2022-21449-TLS-PoC: CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable…
CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server - notkmhn/CVE-2022-21449-TLS-PoC
New elevation of privilege Linux vulnerability : Nimbuspwn
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
Microsoft News
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn
Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could…
Israeli 🇮🇱 Pegasus Spyware — Untold — Chinese Engineering — Samples 1 & 2.
The Israel, unable to create a smart spyware copied code for the app from China 🇨🇳 based APT and purchased Zero-Day from a security researcher from rhe money 💰 of primarily United States' 🇺🇸 taxpayers.
https://jonathandata1.medium.com/pegasus-spyware-untold-chinese-engineering-samples-1-2-e5aba2a0b20b
The Israel, unable to create a smart spyware copied code for the app from China 🇨🇳 based APT and purchased Zero-Day from a security researcher from rhe money 💰 of primarily United States' 🇺🇸 taxpayers.
https://jonathandata1.medium.com/pegasus-spyware-untold-chinese-engineering-samples-1-2-e5aba2a0b20b
Medium
Pegasus Spyware — Untold — Chinese Engineering — Samples 1 & 2
A Short Background
● Telegram Messenger (as per my analysis) becomes the largest public collection of DarkWeb content, resources, breached data and similar.
Zero-Day: Critical F5 BIG-IP flaw allows device takeover (CVE-2022-1388).
https://www.helpnetsecurity.com/2022/05/05/cve-2022-1388/
https://www.helpnetsecurity.com/2022/05/05/cve-2022-1388/
Help Net Security
Critical F5 BIG-IP flaw allows device takeover, patch ASAP! (CVE-2022-1388)
F5 Networks‘ BIG-IP multi-purpose networking devices/modules are vulnerable to unauthenticated RCE attacks via CVE-2022-1388.
Speed-Hack: WordPress sites getting hacked ‘within seconds’ of TLS certificates being issued.
https://portswigger.net/daily-swig/wordpress-sites-getting-hacked-within-seconds-of-tls-certificates-being-issued
https://portswigger.net/daily-swig/wordpress-sites-getting-hacked-within-seconds-of-tls-certificates-being-issued
The Daily Swig | Cybersecurity news and views
WordPress sites getting hacked ‘within seconds’ of TLS certificates being issued
Attackers pounce before site owners can activate the installation wizard
An advanced threat actor has leaked data of multiple institutions, organizations, nation-states and civilians in varying forms (PII, documents, credentials and similar).
The data collage is huge and we (t.me/ckure) have received the copy.
Some leaks were previously public. However, some are either new or were previously unreported.
The data collage is huge and we (t.me/ckure) have received the copy.
Some leaks were previously public. However, some are either new or were previously unreported.
Telegram
cKure
﷽
This channel was created in 2018 and contains content from the information security domain.
This channel is primarily run by AI bots (n8n).
Archive: ckure.esy.es
Criticals: @ckuRED
linkedin.com/company/ckure
Support 📨 i@ckure.org
This channel was created in 2018 and contains content from the information security domain.
This channel is primarily run by AI bots (n8n).
Archive: ckure.esy.es
Criticals: @ckuRED
linkedin.com/company/ckure
Support 📨 i@ckure.org
Well written from A to Z: Exploiting a Use-After-Free for code execution in every version of Python 3.
https://pwn.win/2022/05/11/python-buffered-reader.html
https://pwn.win/2022/05/11/python-buffered-reader.html
pwn.win
Exploiting a Use-After-Free for code execution in every version of Python 3
A while ago I was browsing the Python bug tracker, and I stumbled upon this bug - “memoryview to freed memory can cause segfault”. It was created in 2012, originally present in Python 2.7, but remains open to this day, 10 years later. This piqued my interest…
Multiple bugs chained to takeover Facebook Accounts which uses Gmail. ($42K)
https://ysamm.com/?p=763
https://ysamm.com/?p=763
Proof-of-concept exploit release: nginx mp4 module DoS & Infoleak Vulnerability (2018) by @alisaesage.
Proof-of-concept exploit that demonstrates an out of bounds read in nginx v1.15.5 heap. This can be worked up to an information disclosure exploit with a bit of extra work. The bug itself, and potentially the exploit, affects earlier nginx versions to some extent.
https://zerodayengineering.com/exploits/nginx-mp4-infoleak.html
Proof-of-concept exploit that demonstrates an out of bounds read in nginx v1.15.5 heap. This can be worked up to an information disclosure exploit with a bit of extra work. The bug itself, and potentially the exploit, affects earlier nginx versions to some extent.
https://zerodayengineering.com/exploits/nginx-mp4-infoleak.html
"Masato Kinugawa vs Microsoft Teams" live from Pwn2Own Vancouver 2022.
https://t.co/EeQLS2Sbwfhttps://youtu.be/3fWo0E6Pa34
https://t.co/EeQLS2Sbwfhttps://youtu.be/3fWo0E6Pa34
Zero-Day: When Windows Active Directory is newly installed and settings are not changed, any user can create 10 computer accounts.
using this command
"djoin /PROVISION /DOMAIN <fqdn> /MACHINE cKPC /SAVEFILE C:\temp\cKPC.txt /DEFPWD /PRINTBLOB /NETBIOS cKPC"
This will create the computer account named cKPC with the password cKPC.
Credits: Qusai Alhaddad
using this command
"djoin /PROVISION /DOMAIN <fqdn> /MACHINE cKPC /SAVEFILE C:\temp\cKPC.txt /DEFPWD /PRINTBLOB /NETBIOS cKPC"
This will create the computer account named cKPC with the password cKPC.
Credits: Qusai Alhaddad