CVE-2023-46805, CVE-2024-21887: Auth bypass & command injection in Ivanti Connect Secure, 8.2 & 9.1 rating π₯
Two 0-days in Ivanti product. Vulns allow to access restricted resources and execute arbitrary commands by sending special requests.
Search at Netlas.io:
ππ» Link: https://nt.ls/I0nJC
ππ» Dork: http.body:"welcome.cgi?p=logo"
Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
Two 0-days in Ivanti product. Vulns allow to access restricted resources and execute arbitrary commands by sending special requests.
Search at Netlas.io:
ππ» Link: https://nt.ls/I0nJC
ππ» Dork: http.body:"welcome.cgi?p=logo"
Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
πΎ5π3π₯1
Unprotected databases with Netlas.io: Chapter 2 π₯
Since the publication of the previous article, databases have not ceased to be an important target for hackers. This is confirmed by our new publication, during the writing of which already hacked databases were found. Hurry up and check is your data save! π
ππ» Read here: https://netlas.medium.com/how-to-find-unprotected-databases-with-netlas-io-chapter-2-ba71b07c9630
Since the publication of the previous article, databases have not ceased to be an important target for hackers. This is confirmed by our new publication, during the writing of which already hacked databases were found. Hurry up and check is your data save! π
ππ» Read here: https://netlas.medium.com/how-to-find-unprotected-databases-with-netlas-io-chapter-2-ba71b07c9630
Medium
How to find unprotected databases with Netlas.io: Chapter 2
Continue to study the importance of database security using the examples of Netlas searches. This time youβll even see hacked databases!
π₯5πΎ3
CVE-2023-22527: RCE in Atlassian Confluence, 10.0 rating π₯
A template injection vulnerability allows attackers to perform RCE on vulnerable devices. Thousands of exploitation attempts by hackers have already been recordedβ
Search at Netlas.io:
π Link: https://nt.ls/e0S6w
π Dork: http.meta:"confluence-base-url"
Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html
A template injection vulnerability allows attackers to perform RCE on vulnerable devices. Thousands of exploitation attempts by hackers have already been recordedβ
Search at Netlas.io:
π Link: https://nt.ls/e0S6w
π Dork: http.meta:"confluence-base-url"
Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html
π₯4πΎ4
Our data just got better! π₯
The Netlas team is pleased to announce that the DNS resolver* have been modified. The error is now less than 0.5% for any DNS record, which gives you much more accurate results.
In addition, improvements made it possible to collect a great number of records - almost 2.5 billion π
π Check it out in new datasets: https://app.netlas.io/datastore/
*DNS resolver - Netlas module responsible for collecting Domain Name System data.
The Netlas team is pleased to announce that the DNS resolver* have been modified. The error is now less than 0.5% for any DNS record, which gives you much more accurate results.
In addition, improvements made it possible to collect a great number of records - almost 2.5 billion π
π Check it out in new datasets: https://app.netlas.io/datastore/
*DNS resolver - Netlas module responsible for collecting Domain Name System data.
app.netlas.io
Discover, Research and Monitor any Assets Available Online
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets.
πΎ4π₯2π1
CVE-2024-23897: Critical vulnerability in Jenkins π₯
Jenkins instances versions earlier than 2.441 are susceptible to a vulnerability that allows an attacker to read arbitrary files via the command line.
Search at Netlas.io:
π Link: https://nt.ls/z5QU0
π Dork: http.headers.x_jenkins:[0 TO 2.441]
Vendor's advisory: https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
Jenkins instances versions earlier than 2.441 are susceptible to a vulnerability that allows an attacker to read arbitrary files via the command line.
Search at Netlas.io:
π Link: https://nt.ls/z5QU0
π Dork: http.headers.x_jenkins:[0 TO 2.441]
Vendor's advisory: https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
πΎ4β€2π₯2π1π1
CVE-2024-21690 and other: Multiple vuln in Junos OS, 8.8 ratingβοΈ
Four vulnerabilities with ratings 5.3-8.8. XSS and missing authentication, which allow an attacker to execute commands with the rights of any user, including an administrator.
Search at Netlas.io:
ππ» Link: https://nt.ls/CpoFo
ππ» Dork: http.title:"Juniper"
Vendor's advisory: https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US
Four vulnerabilities with ratings 5.3-8.8. XSS and missing authentication, which allow an attacker to execute commands with the rights of any user, including an administrator.
Search at Netlas.io:
ππ» Link: https://nt.ls/CpoFo
ππ» Dork: http.title:"Juniper"
Vendor's advisory: https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US
πΎ5β€2π2π€1
CVE-2024-20931: Vulnerability in Oracle WebLogic, 7.5 ratingβοΈ
A simple vulnerability allows an unauthenticated attacker to gain access to data on the server or perform RCE. PoC is now available!
Search at Netlas.io:
ππ» Link: https://nt.ls/P0M38
ππ» Dork: protocol:t3 OR protocol:t3s
Vendor's advisory: https://www.oracle.com/security-alerts/cpujan2024verbose.html
A simple vulnerability allows an unauthenticated attacker to gain access to data on the server or perform RCE. PoC is now available!
Search at Netlas.io:
ππ» Link: https://nt.ls/P0M38
ππ» Dork: protocol:t3 OR protocol:t3s
Vendor's advisory: https://www.oracle.com/security-alerts/cpujan2024verbose.html
π₯5πΎ3π€2
CVE-2024-22024: XXE in Ivanti Connect Secure, 8.8 ratingβοΈ
The vulnerability allows an unauthenticated attacker to gain access to certain internal resources. According to Ivanti, the problem was found during an internal audit and has not yet been exploited.
Search at Netlas.io:
ππ» Link: https://nt.ls/0AKq9
ππ» Dork: http.body:"welcome.cgi?p=logo"
Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
The vulnerability allows an unauthenticated attacker to gain access to certain internal resources. According to Ivanti, the problem was found during an internal audit and has not yet been exploited.
Search at Netlas.io:
ππ» Link: https://nt.ls/0AKq9
ππ» Dork: http.body:"welcome.cgi?p=logo"
Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
π4πΎ3
Indicator Lifecycle completing with Netlas.io π₯
We present to you an article from Adam Goss, in which the author reviewed a good use case for Netlas. In it you will learn how to use the ASD Tool in Threat Hunting π
ππ» Read here: https://adamgoss.medium.com/netlas-io-a-powerful-suite-of-tools-for-threat-hunting-5aae7b6291a8
Enjoy reading!
We present to you an article from Adam Goss, in which the author reviewed a good use case for Netlas. In it you will learn how to use the ASD Tool in Threat Hunting π
ππ» Read here: https://adamgoss.medium.com/netlas-io-a-powerful-suite-of-tools-for-threat-hunting-5aae7b6291a8
Enjoy reading!
Medium
Netlas.io: A Powerful Suite of Tools for Threat Hunting
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add intel to your investigations, and map the attack surfaces
πΎ5π₯4β€2
CVE-2023-43770: Old XSS in Roundcube, that is being exploited nowβ
A patch for this CVE appeared back in September, however, according to CISA, it is now actively used in attacks, allowing hackers to gain access to restricted information.
Search at Netlas.io:
π Link: https://nt.ls/LAQwc
π Dork: http.favicon.hash_sha256:20c30fd4340308d6a4ab222acae353fc2460793ac76645bb1ef1d9d61f4f0a9e
Read more: https://www.bleepingcomputer.com/news/security/cisa-roundcube-email-server-bug-now-exploited-in-attacks/
A patch for this CVE appeared back in September, however, according to CISA, it is now actively used in attacks, allowing hackers to gain access to restricted information.
Search at Netlas.io:
π Link: https://nt.ls/LAQwc
π Dork: http.favicon.hash_sha256:20c30fd4340308d6a4ab222acae353fc2460793ac76645bb1ef1d9d61f4f0a9e
Read more: https://www.bleepingcomputer.com/news/security/cisa-roundcube-email-server-bug-now-exploited-in-attacks/
πΎ5π3π₯2β€1
CVE-2024-21410: 0day in MS Exchange, 9.8 rating π₯
The vulnerability allows unauthenticated attackers to perform privilege escalation in NTLM relay attacks.
Search at Netlas.io:
ππ» Link: https://nt.ls/pR4S2
ππ» Dork: tag.name:"microsoft_exchange"
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
The vulnerability allows unauthenticated attackers to perform privilege escalation in NTLM relay attacks.
Search at Netlas.io:
ππ» Link: https://nt.ls/pR4S2
ππ» Dork: tag.name:"microsoft_exchange"
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
πΎ4β€2π₯2π1
How to find out what hardware is used in a certain plantβ How to assess the level of security of a certain area's critical infrastructureβ
About this in our new article dedicated to industrial software and devices π₯
ππ» Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
Enjoy reading!
About this in our new article dedicated to industrial software and devices π₯
ππ» Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
Enjoy reading!
Medium
Searching industrial infrastructure with Netlas.io
In this article you will learn how to find industrial devices and software with Netlasβ help.
πΎ5π₯3β€1π1
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating π₯π₯π₯
The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!
Search at Netlas.io:
ππ» Link: https://nt.ls/Vbu6L
ππ» Dork: http.headers.server:"ScreenConnect"
Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!
Search at Netlas.io:
ππ» Link: https://nt.ls/Vbu6L
ππ» Dork: http.headers.server:"ScreenConnect"
Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
πΎ5π₯3β€2π€―1
CVE-2024-21722, 723, 724, 25, 26: Multiple vulns in JoomlaβοΈ
Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.
Search at Netlas.io:
ππ» Link: https://nt.ls/dNRpZ
ππ» Dork: tag.name:"joomla"
Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.
Search at Netlas.io:
ππ» Link: https://nt.ls/dNRpZ
ππ» Dork: tag.name:"joomla"
Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
π₯6πΎ4β€2π¦1
Netlas.io
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating π₯π₯π₯ The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available! Search at Netlas.io: ππ» Link: https://nt.ls/Vbu6L ππ» Dork: http.headers.serβ¦
Data of more than 85 million United Healthcare customers leaked by hackers π¨
Many pharmaceutical companies in the United States were attacked using the recent vulnerability (CVE-2024-1709) in ScreenConnect, and United Healthcare itself is still restoring its infrastructure π
Some servers are still vulnerable: https://nt.ls/Vbu6L
Many pharmaceutical companies in the United States were attacked using the recent vulnerability (CVE-2024-1709) in ScreenConnect, and United Healthcare itself is still restoring its infrastructure π
Some servers are still vulnerable: https://nt.ls/Vbu6L
app.netlas.io
Discover, Research and Monitor any Assets Available Online
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets.
πΎ3β€2π₯2π2π1π’1
We regret to inform you that due to unforeseen network issues, Netlas.io is currently unavailable. Our team is actively working to resolve the issue and restore service as soon as possible. We apologize for any inconvenience caused and appreciate your patience and understanding. Stay tuned for updates. Thank you. π
π4π3π’2β€1
π We're back online! Everything's running smoothly. Our team's investigating to prevent future incidents like this. Thanks for your patience! π
π₯6π2πΎ1
Interface update π»
To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.
Good luck with your projects and thank you for using Netlas!
To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.
Good luck with your projects and thank you for using Netlas!
πΎ5β€2π1
How to find live cameras with Netlas - short cheatsheet π
A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? π
π Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? π
π Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
β€5πΎ4π₯1
Fact: old SSL/TLS certificate threatens both the reputation of the website and the security of the data the user is working withβ
How to check the certificate for yourself or a contractor?
π Just use Netlas: https://app.netlas.io/certs/
How to check the certificate for yourself or a contractor?
π Just use Netlas: https://app.netlas.io/certs/
πΎ3β€1π1