Netlas.io
2.02K subscribers
342 photos
3 videos
465 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2023-46747: Auth Bypass in F5 BIG-IP, 9.8 rating πŸ”₯

An attacker using undisclosed requests can bypass authentication and gain access to execute arbitrary commands on the victim system.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/OcYHT
πŸ‘‰πŸ» Dork: http.headers.server:"BigIP"
You can also use the "f5_bigip" tag to get more results.

Vendor's advisory: https://my.f5.com/manage/s/article/K000137353
πŸ‘Ύ4πŸ‘2πŸ”₯1
New cheatsheet πŸ“„

Today we have prepared for you useful search filters that will greatly facilitate the creation of queries for Netlas.io πŸ”
πŸ‘Ύ5πŸ‘1
Do you remember that Netlas can be used as an extension for Google Chrome?

Well, from today our plugin is also available for the Mozilla Firefox browser! 🦊

Now it's users can explore the site they are on at any time with a couple of clicks. Find out potential vulnerabilities, host data, and much more.

πŸ‘‰πŸ» Read more (updated): https://netlas.medium.com/netlas-io-chrome-extension-65a8e3d03bc0
πŸ‘‰πŸ» Add-on: https://addons.mozilla.org/en-GB/firefox/addon/netlas-io/
πŸ‘Ύ7πŸ‘2
CVE-2023-22518: Improper Authorization in Atlassian Confluence Data&Server, 9.1 rating πŸ”₯

Not a very fresh vulnerability, but the recently released PoC makes it worthy of attention.

Search at Netlas.io:
πŸ‘‰πŸ» Link (tag, more results): https://nt.ls/MwYfk
πŸ‘‰πŸ» Link (no tag, less results): https://nt.ls/nysj9

πŸ‘‰πŸ» Dork β„–1: tag.name:"atlassian_confluence"
πŸ‘‰πŸ» Dork β„–2: http.meta:"confluence-base-url"

Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html
More about PoC: https://github.com/sanjai-AK47/CVE-2023-22518
πŸ‘Ύ5πŸ‘1
ZDI-23-1578, 1579, 1580, 1581: 0-day vulnerabilities in Microsoft Exchange, 7.1-7.5 rating ❗️

These vulns require authorization to operate, which greatly reduces their threat, but ZDI researchers still recommend limiting access to Exchange servers.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/t8cJK
πŸ‘‰πŸ» Dork: tag.name:"microsoft_exchange"

Read more: https://www.zerodayinitiative.com/advisories/ZDI-23-1578/
πŸ‘Ύ4πŸ‘1
CVE-2023-46849, -46850: DoS and use-after-free in OpenVPN Access Server ❗️

If the --fragment parameter is present in the target device's configuration, an attacker can crash the software by dividing by zero and also gain access to sensitive information.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/GpBD3
πŸ‘‰πŸ» Dork: http.headers.server:"OpenVPN-AS"

Vendor's advisory: https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/
πŸ‘Ύ4❀1πŸ‘1πŸ”₯1
New article on our blog. And this time with the fresh script πŸ”₯

Today we will tell how you can use Netlas to search for potentially vulnerable objects in your attack surface. Do not miss the Github link at the end of the article!

πŸ‘‰πŸ» Link: https://netlas.medium.com/how-to-find-probably-vulnerable-objects-in-your-own-surface-with-netlas-io-7f3448363892
πŸ‘Ύ5πŸ”₯3
CVE-2023-49103: Exposure of Sensitive Information in ownCloud, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

Due to the owncloud/graphapi component, important configuration facts such as license keys, admin credentials may be exposed.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/Igs48
πŸ‘‰πŸ» Dork: http.title:"ownCloud"

Vendor's advisory: https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
πŸ‘Ύ6πŸ‘1
CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating ❗️

Some Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/hbCPs
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527

Vendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/
πŸ‘Ύ4πŸ”₯3πŸ‘2
CVE-2023-34060: Authentication Bypass in VMware Cloud Director Appliance, 9.8 rating πŸ”₯

Devices running version 10.5 and using authentication on ports 22 or 5480 may be vulnerable. The recommended protection method is to update to version 10.5.1.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/H5pYN
πŸ‘‰πŸ» Dork: http.title:"Cloud Director"

Vendor's advisory: https://www.vmware.com/security/advisories/VMSA-2023-0026.html
πŸ”₯8πŸ‘Ύ3
CVE-2023-22522, -25524: Two RCE in Atlassian Confluence Data&Server, 9.0 rating πŸ”₯

More problems with Atlassian software. This time, an authorized attacker (even an anonymous one) can inject code and achieve RCE. We recommend updating.

Search at Netlas.io:
πŸ‘‰πŸ» Link (tag, more results): https://nt.ls/DZHaW
πŸ‘‰πŸ» Link (no tag, less results): https://nt.ls/Siajm

πŸ‘‰πŸ» Dork β„–1: tag.name:"atlassian_confluence"
πŸ‘‰πŸ» Dork β„–2: http.meta:"confluence-base-url"

Vendor's advisory: https://confluence.atlassian.com/security/december-2023-security-advisories-overview-1318892103.html
πŸ‘Ύ4πŸ‘3πŸ”₯1
Full attack surface reconnaissance with reNgine & Netlas.io πŸ”₯

New article on our blog, in which we will talk about using the reNgine intelligence framework in conjunction with Netlas.io. Subdomains, endpoints, OSINT information and much more will be found πŸ”

πŸ‘‰ Read here: https://netlas.medium.com/using-rengine-with-netlas-io-module-436e764a5495

Enjoy reading!
πŸ‘Ύ5πŸ‘3πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
Dear Netlas users,

We have been experiencing problems with the site for the last two days. We sincerely apologize for this.

This is because we are migrating our application to new hardware, doubling the computing power. We promise that after the move is completed, Netlas will work faster and more stable.

Thank you for your patience ❀️
πŸ’Š12😭2
CVE-2023-45316, -45847, -46701 and other: Multiple vuln in Mattermost, 3.7 - 7.3 rating ❗️

DoS, Path Traversal, Improper Access Control and much more: seven fresh vulnerabilities in the Mattermost chat application.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/83sLi
πŸ‘‰πŸ» Dork: http.meta:"mattermost"

Vendor's advisory: https://mattermost.com/security-updates/
πŸ‘Ύ4πŸ‘1
CVE-2023-42325, -42326, -42327: XSS and RCE in pfSense Security, 5.4 - 8.8 rating πŸ”₯

By combining vulnerabilities, an attacker can force a user to activate XSS payload and thereby achieve RCE. pfSense CE 2.7.0 and below, pfSense Plus 23.05.1 and below are vulnerable.

Search at
Netlas.io:
πŸ‘‰
Link (tag, more results): https://nt.ls/BRDDo
πŸ‘‰ Link (no tag): https://nt.ls/Mr8WD
πŸ‘‰ Dork: http.favicon.hash_sha256:b2dd935235013a51fde0a2afc12ba965952e384b7ab43fe1746cc21c7eafc38c

Vendor's advisory:
https://docs.netgate.com/downloads/pfSense-SA-23_08.webgui.asc
πŸ‘Ύ6πŸ‘1
A great guide to using Netlas πŸ”₯

A few days ago, ZeusCybersec released a cool article dedicated to our application πŸ“–
For anyone who still doubts whether they should use Netlas, we recommend reading it!

Article: https://sparshjazz.medium.com/netlas-io-best-osint-tool-in-cybersecurity-industry-0e9e2e28bfee
πŸ‘Ύ4πŸ‘1
CVE-2023-35384, -36710: RCE and Bypass in Microsoft Outlook, 5.4 - 7.8 rating πŸ”₯

Despite the fact that only one of the vulnerabilities has a Network attack vector, combining them could allow an attacker to carry out a full-fledged 0-click RCE against Outlook users.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/imL2R
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:cf0808a61ec571e0c4975663903b288009d55502ac0445d9948983b339a5cf6e

Read more: https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-one
πŸ‘Ύ4πŸ‘2
CVE-2023-7102: vulnerability in Barracuda ESG, 8.8 ratingπŸ”₯

An ACE vulnerability in the third-party library Spreadsheet::ParseExcel allowed hackers to deploy a backdoor on an unknown number of devices.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/fJ3H9
πŸ‘‰ Dork: http.favicon.hash_sha256:555e2bc263107f6869c0e1f6b907369b2dff25d001ebd8432d60062dc9699197

Vendor's advisory: https://www.barracuda.com/company/legal/esg-vulnerability
πŸ‘Ύ5πŸ‘2
How to detect unprotected databases? About this in our new article πŸ”₯

Databases accessible from the Internet are an attractive target for attackers. In new article, we will tell you how to find them using Netlas and make sure that you are invulnerable to this.

πŸ‘‰ Article: https://netlas.medium.com/how-to-find-unprotected-databases-with-netlas-io-2bf186e9fc2d
πŸ‘6πŸ‘Ύ6
Tomorrow the new year begins, and Netlas.io wants to share with you the results of the outgoing year! πŸŽ„

Are you ready to little statistic?

πŸ‘‰ Total requests: > 3.447.000
πŸ‘‰ New users: 8.970
πŸ‘‰ Total coins spent: > 11.300.000
πŸ‘‰ Total graphs saved: 515

πŸ“– Most popular article: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
❗ Most popular CVE post: CVE-2023-3128 (https://twitter.com/Netlas_io/status/1672167625617727488)

Thank you for being with us. Stay in touch, conduct reconnaissance, read about vulnerabilities. See you next year!
πŸŽ„11πŸ‘4
CVE-2023-39336: SQL injection and RCE in Ivanti EPM, 9.6 rating πŸ”₯

An attacker can use SQL injection without authentication. Additionally, if the core server is configured to use Microsoft SQL Express, this might lead to RCE on the core server.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/fSOY9
πŸ‘‰πŸ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor's advisory: https://forums.ivanti.com/s/article/SA-2023-12-19-CVE-2023-39336?language=en_US
πŸ”₯6πŸ‘Ύ4πŸ‘2