CVE-2023-36434: Elevation of Privilege in Windows IIS Server, 9.8 rating π₯
In a network-based attack, an attacker could brute force user account passwords to log in as that user. So, faster get fresh Windows update!
Search at Netlas.io:
ππ» Link: https://nt.ls/5rvmi
ππ» Dork: http.headers.server:"Microsoft-IIS"
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434
In a network-based attack, an attacker could brute force user account passwords to log in as that user. So, faster get fresh Windows update!
Search at Netlas.io:
ππ» Link: https://nt.ls/5rvmi
ππ» Dork: http.headers.server:"Microsoft-IIS"
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434
πΎ3π₯2
Meet Netlas Cookbook!
A thousand and one ways to use Netlas in your code
Today we launch Netlas Cookbook, a guide that will help our users to build automations. No matter how deep your programming skills are or what programming language do you preffer. We'll try our best to give you a clear and simple recipe for the automation you need.
Netlas Cookbook includes:
- Search query syntax and examples
- Search tips and tricks
- Use-cases and usage scenarios
- Code examples
- Tools for working with Netlas API
You will find out how to write automations using Python, Bash, NodeJS, Ruby, Go, AI tools. We will talk about using Netlas for bug bounty jobs, penetration testing, OSINT and other tasks.
βοΈ Give us a star if you want to show your appreciation for our work.
ποΈ Subscribe to the repo to get notified on updates.
ππΌ https://github.com/netlas-io/netlas-cookbook
Do you have any automation related questions? Perhaps you've already developed an awsome script and want to share it? Write us in the comments.
Many thanks to Cyber Detective for help: https://t.me/cybdetective
A thousand and one ways to use Netlas in your code
Today we launch Netlas Cookbook, a guide that will help our users to build automations. No matter how deep your programming skills are or what programming language do you preffer. We'll try our best to give you a clear and simple recipe for the automation you need.
Netlas Cookbook includes:
- Search query syntax and examples
- Search tips and tricks
- Use-cases and usage scenarios
- Code examples
- Tools for working with Netlas API
You will find out how to write automations using Python, Bash, NodeJS, Ruby, Go, AI tools. We will talk about using Netlas for bug bounty jobs, penetration testing, OSINT and other tasks.
βοΈ Give us a star if you want to show your appreciation for our work.
ποΈ Subscribe to the repo to get notified on updates.
ππΌ https://github.com/netlas-io/netlas-cookbook
Do you have any automation related questions? Perhaps you've already developed an awsome script and want to share it? Write us in the comments.
Many thanks to Cyber Detective for help: https://t.me/cybdetective
πΎ7β€3π3π1
A small cheat sheet with Netlas queries useful for OSINT investigations.
Try it here: https://nt.ls/shP9f
#cheatsheet #cybersecurity #osint
Try it here: https://nt.ls/shP9f
#cheatsheet #cybersecurity #osint
π5πΎ5β‘1π1π1
CVE-2023-20198: Privilege Escalation in Cisco IOS XE Web UI, 10.0 rating π₯π₯π₯
The vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access.
Search at Netlas.io:
ππ» Link: https://nt.ls/7dU0x
ππ» Dork: certificate.issuer_dn:"IOS-Self-Signed-Certificate" AND http.body:"webui"
Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
The vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access.
Search at Netlas.io:
ππ» Link: https://nt.ls/7dU0x
ππ» Dork: certificate.issuer_dn:"IOS-Self-Signed-Certificate" AND http.body:"webui"
Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
π₯5πΎ3
Have you ever gotten confused about the fields from the Netlas API responseβ
This won't happen anymore, because the new cheat sheet presents the most popular fields! π₯
π Try Netlas.io: https://nt.ls/shP9f
This won't happen anymore, because the new cheat sheet presents the most popular fields! π₯
π Try Netlas.io: https://nt.ls/shP9f
πΎ5π2
New article on our Medium! π₯
This time we will tell you how to activate and use the Netlas.io module integrated into Subfinder by ProjectDiscovery.
π Link: https://netlas.medium.com/using-subfinder-with-netlas-io-module-9e7fa4e630dd
This time we will tell you how to activate and use the Netlas.io module integrated into Subfinder by ProjectDiscovery.
π Link: https://netlas.medium.com/using-subfinder-with-netlas-io-module-9e7fa4e630dd
Medium
Using Subfinder with Netlas.io module
Instructions for using the Netlas module integrated into Subfinder from ProjectDiscovery
πΎ5π4β€1
New article on our blog! π₯
Today you will learn how to recognize phishing sites and explore Shadow IT using Netlas.
ππ» Link: https://netlas.medium.com/how-to-detect-scam-and-shadow-it-domains-with-netlas-io-f72085e6f18b
ππ» Also read about phishing in our CookBook: https://nt.ls/cook
Good reading!
Today you will learn how to recognize phishing sites and explore Shadow IT using Netlas.
ππ» Link: https://netlas.medium.com/how-to-detect-scam-and-shadow-it-domains-with-netlas-io-f72085e6f18b
ππ» Also read about phishing in our CookBook: https://nt.ls/cook
Good reading!
Medium
How to detect scam and shadow IT domains with Netlas.io?
Phishing sites are a serious threat on the Internet. In this article I will tell you how to avoid them using Netlas.
πΎ4π1π₯1
We continue to publish small cheat sheets for using Netlas π
Have you ever tried to use our search engine for entertainment? π
ππ» Try now with example: https://nt.ls/RCpox
Have you ever tried to use our search engine for entertainment? π
ππ» Try now with example: https://nt.ls/RCpox
πΎ6π2
CVE-2023-4967: Sensitive information disclosure in Citrix NetScaler ADC/Gateway, 9.4 ratingβοΈ
The vulnerability emerges from the return value of the snprintf function, which can lead to a buffer over-read if exploited. By this, the session token can be intercepted. Also, PoC is available now.
Search at Netlas.io:
ππ» Link: https://nt.ls/5g7Md
ππ» Dork: http.title:"Netscaler Gateway" OR http.headers.x_powered_by:"Citrix ADC (formerly NetScaler)"
Read about PoC: https://www.bleepingcomputer.com/news/security/citrix-bleed-exploit-lets-hackers-hijack-netscaler-accounts/
Vendor's advisory: https://support.citrix.com/article/CTX579459
The vulnerability emerges from the return value of the snprintf function, which can lead to a buffer over-read if exploited. By this, the session token can be intercepted. Also, PoC is available now.
Search at Netlas.io:
ππ» Link: https://nt.ls/5g7Md
ππ» Dork: http.title:"Netscaler Gateway" OR http.headers.x_powered_by:"Citrix ADC (formerly NetScaler)"
Read about PoC: https://www.bleepingcomputer.com/news/security/citrix-bleed-exploit-lets-hackers-hijack-netscaler-accounts/
Vendor's advisory: https://support.citrix.com/article/CTX579459
π₯4πΎ2
CVE-2023-46747: Auth Bypass in F5 BIG-IP, 9.8 rating π₯
An attacker using undisclosed requests can bypass authentication and gain access to execute arbitrary commands on the victim system.
Search at Netlas.io:
ππ» Link: https://nt.ls/OcYHT
ππ» Dork: http.headers.server:"BigIP"
You can also use the "f5_bigip" tag to get more results.
Vendor's advisory: https://my.f5.com/manage/s/article/K000137353
An attacker using undisclosed requests can bypass authentication and gain access to execute arbitrary commands on the victim system.
Search at Netlas.io:
ππ» Link: https://nt.ls/OcYHT
ππ» Dork: http.headers.server:"BigIP"
You can also use the "f5_bigip" tag to get more results.
Vendor's advisory: https://my.f5.com/manage/s/article/K000137353
πΎ4π2π₯1
Do you remember that Netlas can be used as an extension for Google Chrome?
Well, from today our plugin is also available for the Mozilla Firefox browser! π¦
Now it's users can explore the site they are on at any time with a couple of clicks. Find out potential vulnerabilities, host data, and much more.
ππ» Read more (updated): https://netlas.medium.com/netlas-io-chrome-extension-65a8e3d03bc0
ππ» Add-on: https://addons.mozilla.org/en-GB/firefox/addon/netlas-io/
Well, from today our plugin is also available for the Mozilla Firefox browser! π¦
Now it's users can explore the site they are on at any time with a couple of clicks. Find out potential vulnerabilities, host data, and much more.
ππ» Read more (updated): https://netlas.medium.com/netlas-io-chrome-extension-65a8e3d03bc0
ππ» Add-on: https://addons.mozilla.org/en-GB/firefox/addon/netlas-io/
Medium
Netlas.io Chrome extension
Extensions for Google Chrome are a very popular way to extend the functionality of the browser. Now Netlas has it too!
πΎ7π2
CVE-2023-22518: Improper Authorization in Atlassian Confluence Data&Server, 9.1 rating π₯
Not a very fresh vulnerability, but the recently released PoC makes it worthy of attention.
Search at Netlas.io:
ππ» Link (tag, more results): https://nt.ls/MwYfk
ππ» Link (no tag, less results): https://nt.ls/nysj9
ππ» Dork β1: tag.name:"atlassian_confluence"
ππ» Dork β2: http.meta:"confluence-base-url"
Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html
More about PoC: https://github.com/sanjai-AK47/CVE-2023-22518
Not a very fresh vulnerability, but the recently released PoC makes it worthy of attention.
Search at Netlas.io:
ππ» Link (tag, more results): https://nt.ls/MwYfk
ππ» Link (no tag, less results): https://nt.ls/nysj9
ππ» Dork β1: tag.name:"atlassian_confluence"
ππ» Dork β2: http.meta:"confluence-base-url"
Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html
More about PoC: https://github.com/sanjai-AK47/CVE-2023-22518
πΎ5π1
ZDI-23-1578, 1579, 1580, 1581: 0-day vulnerabilities in Microsoft Exchange, 7.1-7.5 rating βοΈ
These vulns require authorization to operate, which greatly reduces their threat, but ZDI researchers still recommend limiting access to Exchange servers.
Search at Netlas.io:
ππ» Link: https://nt.ls/t8cJK
ππ» Dork: tag.name:"microsoft_exchange"
Read more: https://www.zerodayinitiative.com/advisories/ZDI-23-1578/
These vulns require authorization to operate, which greatly reduces their threat, but ZDI researchers still recommend limiting access to Exchange servers.
Search at Netlas.io:
ππ» Link: https://nt.ls/t8cJK
ππ» Dork: tag.name:"microsoft_exchange"
Read more: https://www.zerodayinitiative.com/advisories/ZDI-23-1578/
πΎ4π1
CVE-2023-46849, -46850: DoS and use-after-free in OpenVPN Access Server βοΈ
If the --fragment parameter is present in the target device's configuration, an attacker can crash the software by dividing by zero and also gain access to sensitive information.
Search at Netlas.io:
ππ» Link: https://nt.ls/GpBD3
ππ» Dork: http.headers.server:"OpenVPN-AS"
Vendor's advisory: https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/
If the --fragment parameter is present in the target device's configuration, an attacker can crash the software by dividing by zero and also gain access to sensitive information.
Search at Netlas.io:
ππ» Link: https://nt.ls/GpBD3
ππ» Dork: http.headers.server:"OpenVPN-AS"
Vendor's advisory: https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/
πΎ4β€1π1π₯1
New article on our blog. And this time with the fresh script π₯
Today we will tell how you can use Netlas to search for potentially vulnerable objects in your attack surface. Do not miss the Github link at the end of the article!
ππ» Link: https://netlas.medium.com/how-to-find-probably-vulnerable-objects-in-your-own-surface-with-netlas-io-7f3448363892
Today we will tell how you can use Netlas to search for potentially vulnerable objects in your attack surface. Do not miss the Github link at the end of the article!
ππ» Link: https://netlas.medium.com/how-to-find-probably-vulnerable-objects-in-your-own-surface-with-netlas-io-7f3448363892
Medium
How to find probably vulnerable objects in your own surface with Netlas.io?
Quickly and easily check organizationβs surface for vulnerabilities using Netlas.io.
πΎ5π₯3
CVE-2023-49103: Exposure of Sensitive Information in ownCloud, 10.0 rating π₯π₯π₯
Due to the owncloud/graphapi component, important configuration facts such as license keys, admin credentials may be exposed.
Search at Netlas.io:
ππ» Link: https://nt.ls/Igs48
ππ» Dork: http.title:"ownCloud"
Vendor's advisory: https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
Due to the owncloud/graphapi component, important configuration facts such as license keys, admin credentials may be exposed.
Search at Netlas.io:
ππ» Link: https://nt.ls/Igs48
ππ» Dork: http.title:"ownCloud"
Vendor's advisory: https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
πΎ6π1
CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating βοΈ
Some Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.
Search at Netlas.io:
ππ» Link: https://nt.ls/hbCPs
ππ» Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527
Vendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/
Some Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.
Search at Netlas.io:
ππ» Link: https://nt.ls/hbCPs
ππ» Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527
Vendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/
πΎ4π₯3π2
CVE-2023-34060: Authentication Bypass in VMware Cloud Director Appliance, 9.8 rating π₯
Devices running version 10.5 and using authentication on ports 22 or 5480 may be vulnerable. The recommended protection method is to update to version 10.5.1.
Search at Netlas.io:
ππ» Link: https://nt.ls/H5pYN
ππ» Dork: http.title:"Cloud Director"
Vendor's advisory: https://www.vmware.com/security/advisories/VMSA-2023-0026.html
Devices running version 10.5 and using authentication on ports 22 or 5480 may be vulnerable. The recommended protection method is to update to version 10.5.1.
Search at Netlas.io:
ππ» Link: https://nt.ls/H5pYN
ππ» Dork: http.title:"Cloud Director"
Vendor's advisory: https://www.vmware.com/security/advisories/VMSA-2023-0026.html
π₯8πΎ3