Netlas.io
2.02K subscribers
342 photos
3 videos
465 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2023-46805, CVE-2024-21887: Auth bypass & command injection in Ivanti Connect Secure, 8.2 & 9.1 rating πŸ”₯

Two 0-days in Ivanti product. Vulns allow to access restricted resources and execute arbitrary commands by sending special requests.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/I0nJC
πŸ‘‰πŸ» Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
πŸ‘Ύ5πŸ‘3πŸ”₯1
Unprotected databases with Netlas.io: Chapter 2 πŸ”₯

Since the publication of the previous article, databases have not ceased to be an important target for hackers. This is confirmed by our new publication, during the writing of which already hacked databases were found. Hurry up and check is your data save! πŸ”

πŸ‘‰πŸ» Read here: https://netlas.medium.com/how-to-find-unprotected-databases-with-netlas-io-chapter-2-ba71b07c9630
πŸ”₯5πŸ‘Ύ3
CVE-2023-22527: RCE in Atlassian Confluence, 10.0 rating πŸ”₯

A template injection vulnerability allows attackers to perform RCE on vulnerable devices. Thousands of exploitation attempts by hackers have already been recorded❗

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/e0S6w
πŸ‘‰ Dork: http.meta:"confluence-base-url"

Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html
πŸ”₯4πŸ‘Ύ4
Our data just got better! πŸ”₯

The Netlas team is pleased to announce that the DNS resolver* have been modified. The error is now less than 0.5% for any DNS record, which gives you much more accurate results.

In addition, improvements made it possible to collect a great number of records - almost 2.5 billion πŸ“ˆ

πŸ‘‰ Check it out in new datasets: https://app.netlas.io/datastore/

*DNS resolver - Netlas module responsible for collecting Domain Name System data.
πŸ‘Ύ4πŸ”₯2πŸ‘1
CVE-2024-23897: Critical vulnerability in Jenkins πŸ”₯

Jenkins instances versions earlier than 2.441 are susceptible to a vulnerability that allows an attacker to read arbitrary files via the command line.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/z5QU0
πŸ‘‰ Dork: http.headers.x_jenkins:[0 TO 2.441]

Vendor's advisory: https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
πŸ‘Ύ4❀2πŸ”₯2πŸ‘1πŸ™1
🚧 Technical works! 🚧

Due to network infrastructure upgrades, Netlas.io will be unavailable for some time.

Our team apologizes for this delay.

upd. Works are completed, Netlas is available again!
πŸ”₯5πŸ™5
CVE-2024-21690 and other: Multiple vuln in Junos OS, 8.8 rating❗️

Four vulnerabilities with ratings 5.3-8.8. XSS and missing authentication, which allow an attacker to execute commands with the rights of any user, including an administrator.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/CpoFo
πŸ‘‰πŸ» Dork: http.title:"Juniper"

Vendor's advisory: https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US
πŸ‘Ύ5❀2πŸ‘2🀝1
CVE-2024-20931: Vulnerability in Oracle WebLogic, 7.5 rating❗️

A simple vulnerability allows an unauthenticated attacker to gain access to data on the server or perform RCE. PoC is now available!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/P0M38
πŸ‘‰πŸ» Dork: protocol:t3 OR protocol:t3s

Vendor's advisory: https://www.oracle.com/security-alerts/cpujan2024verbose.html
πŸ”₯5πŸ‘Ύ3🀝2
CVE-2024-22024: XXE in Ivanti Connect Secure, 8.8 rating❗️

The vulnerability allows an unauthenticated attacker to gain access to certain internal resources. According to Ivanti, the problem was found during an internal audit and has not yet been exploited.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/0AKq9
πŸ‘‰πŸ» Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
πŸ‘4πŸ‘Ύ3
Indicator Lifecycle completing with Netlas.io πŸ”₯

We present to you an article from Adam Goss, in which the author reviewed a good use case for Netlas. In it you will learn how to use the ASD Tool in Threat Hunting πŸ”

πŸ‘‰πŸ» Read here: https://adamgoss.medium.com/netlas-io-a-powerful-suite-of-tools-for-threat-hunting-5aae7b6291a8

Enjoy reading!
πŸ‘Ύ5πŸ”₯4❀2
CVE-2023-43770: Old XSS in Roundcube, that is being exploited now❗

A patch for this CVE appeared back in September, however, according to CISA, it is now actively used in attacks, allowing hackers to gain access to restricted information.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/LAQwc
πŸ‘‰ Dork: http.favicon.hash_sha256:20c30fd4340308d6a4ab222acae353fc2460793ac76645bb1ef1d9d61f4f0a9e

Read more: https://www.bleepingcomputer.com/news/security/cisa-roundcube-email-server-bug-now-exploited-in-attacks/
πŸ‘Ύ5πŸ‘3πŸ”₯2❀1
CVE-2024-21410: 0day in MS Exchange, 9.8 rating πŸ”₯

The vulnerability allows unauthenticated attackers to perform privilege escalation in NTLM relay attacks.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/pR4S2
πŸ‘‰πŸ» Dork: tag.name:"microsoft_exchange"

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
πŸ‘Ύ4❀2πŸ”₯2πŸ‘1
How to find out what hardware is used in a certain plant❓ How to assess the level of security of a certain area's critical infrastructure❓

About this in our new article dedicated to industrial software and devices πŸ”₯

πŸ‘‰πŸ» Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2

Enjoy reading!
πŸ‘Ύ5πŸ”₯3❀1πŸ‘1
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/Vbu6L
πŸ‘‰πŸ» Dork: http.headers.server:"ScreenConnect"

Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
πŸ‘Ύ5πŸ”₯3❀2🀯1
CVE-2024-21722, 723, 724, 25, 26: Multiple vulns in Joomla❗️

Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/dNRpZ
πŸ‘‰πŸ» Dork: tag.name:"joomla"

Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
πŸ”₯6πŸ‘Ύ4❀2πŸ¦„1
Netlas.io
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating πŸ”₯πŸ”₯πŸ”₯ The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available! Search at Netlas.io: πŸ‘‰πŸ» Link: https://nt.ls/Vbu6L πŸ‘‰πŸ» Dork: http.headers.ser…
Data of more than 85 million United Healthcare customers leaked by hackers 🚨

Many pharmaceutical companies in the United States were attacked using the recent vulnerability (CVE-2024-1709) in ScreenConnect, and United Healthcare itself is still restoring its infrastructure πŸ’Š

Some servers are still vulnerable: https://nt.ls/Vbu6L
πŸ‘Ύ3❀2πŸ”₯2🍌2πŸ‘1😒1
We regret to inform you that due to unforeseen network issues, Netlas.io is currently unavailable. Our team is actively working to resolve the issue and restore service as soon as possible. We apologize for any inconvenience caused and appreciate your patience and understanding. Stay tuned for updates. Thank you. πŸ™
πŸ™4πŸ•Š3😒2❀1
πŸš€ We're back online! Everything's running smoothly. Our team's investigating to prevent future incidents like this. Thanks for your patience! πŸ™Œ
πŸ”₯6πŸ‘2πŸ‘Ύ1
Interface update πŸ’»

To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.

Good luck with your projects and thank you for using Netlas!
πŸ‘Ύ5❀2πŸ‘1
How to find live cameras with Netlas - short cheatsheet πŸ“‘

A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? 🌏

πŸ‘‰ Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
❀5πŸ‘Ύ4πŸ”₯1
Fact: old SSL/TLS certificate threatens both the reputation of the website and the security of the data the user is working with❗

How to check the certificate for yourself or a contractor?

πŸ‘‰ Just use Netlas: https://app.netlas.io/certs/
πŸ‘Ύ3❀1πŸ‘1