Netlas.io
2.02K subscribers
342 photos
3 videos
466 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2024-22024: XXE in Ivanti Connect Secure, 8.8 rating❗️

The vulnerability allows an unauthenticated attacker to gain access to certain internal resources. According to Ivanti, the problem was found during an internal audit and has not yet been exploited.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/0AKq9
πŸ‘‰πŸ» Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
πŸ‘4πŸ‘Ύ3
Indicator Lifecycle completing with Netlas.io πŸ”₯

We present to you an article from Adam Goss, in which the author reviewed a good use case for Netlas. In it you will learn how to use the ASD Tool in Threat Hunting πŸ”

πŸ‘‰πŸ» Read here: https://adamgoss.medium.com/netlas-io-a-powerful-suite-of-tools-for-threat-hunting-5aae7b6291a8

Enjoy reading!
πŸ‘Ύ5πŸ”₯4❀2
CVE-2023-43770: Old XSS in Roundcube, that is being exploited now❗

A patch for this CVE appeared back in September, however, according to CISA, it is now actively used in attacks, allowing hackers to gain access to restricted information.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/LAQwc
πŸ‘‰ Dork: http.favicon.hash_sha256:20c30fd4340308d6a4ab222acae353fc2460793ac76645bb1ef1d9d61f4f0a9e

Read more: https://www.bleepingcomputer.com/news/security/cisa-roundcube-email-server-bug-now-exploited-in-attacks/
πŸ‘Ύ5πŸ‘3πŸ”₯2❀1
CVE-2024-21410: 0day in MS Exchange, 9.8 rating πŸ”₯

The vulnerability allows unauthenticated attackers to perform privilege escalation in NTLM relay attacks.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/pR4S2
πŸ‘‰πŸ» Dork: tag.name:"microsoft_exchange"

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
πŸ‘Ύ4❀2πŸ”₯2πŸ‘1
How to find out what hardware is used in a certain plant❓ How to assess the level of security of a certain area's critical infrastructure❓

About this in our new article dedicated to industrial software and devices πŸ”₯

πŸ‘‰πŸ» Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2

Enjoy reading!
πŸ‘Ύ5πŸ”₯3❀1πŸ‘1
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/Vbu6L
πŸ‘‰πŸ» Dork: http.headers.server:"ScreenConnect"

Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
πŸ‘Ύ5πŸ”₯3❀2🀯1
CVE-2024-21722, 723, 724, 25, 26: Multiple vulns in Joomla❗️

Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/dNRpZ
πŸ‘‰πŸ» Dork: tag.name:"joomla"

Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
πŸ”₯6πŸ‘Ύ4❀2πŸ¦„1
Netlas.io
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating πŸ”₯πŸ”₯πŸ”₯ The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available! Search at Netlas.io: πŸ‘‰πŸ» Link: https://nt.ls/Vbu6L πŸ‘‰πŸ» Dork: http.headers.ser…
Data of more than 85 million United Healthcare customers leaked by hackers 🚨

Many pharmaceutical companies in the United States were attacked using the recent vulnerability (CVE-2024-1709) in ScreenConnect, and United Healthcare itself is still restoring its infrastructure πŸ’Š

Some servers are still vulnerable: https://nt.ls/Vbu6L
πŸ‘Ύ3❀2πŸ”₯2🍌2πŸ‘1😒1
We regret to inform you that due to unforeseen network issues, Netlas.io is currently unavailable. Our team is actively working to resolve the issue and restore service as soon as possible. We apologize for any inconvenience caused and appreciate your patience and understanding. Stay tuned for updates. Thank you. πŸ™
πŸ™4πŸ•Š3😒2❀1
πŸš€ We're back online! Everything's running smoothly. Our team's investigating to prevent future incidents like this. Thanks for your patience! πŸ™Œ
πŸ”₯6πŸ‘2πŸ‘Ύ1
Interface update πŸ’»

To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.

Good luck with your projects and thank you for using Netlas!
πŸ‘Ύ5❀2πŸ‘1
How to find live cameras with Netlas - short cheatsheet πŸ“‘

A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? 🌏

πŸ‘‰ Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
❀5πŸ‘Ύ4πŸ”₯1
Fact: old SSL/TLS certificate threatens both the reputation of the website and the security of the data the user is working with❗

How to check the certificate for yourself or a contractor?

πŸ‘‰ Just use Netlas: https://app.netlas.io/certs/
πŸ‘Ύ3❀1πŸ‘1
CVE-2024-27198, -27199: Auth Bypass in JetBrains TeamCity, 9.8 rating πŸ”₯

The vulnerabilities may enable an attacker to bypass authentication checks and gain administrative permissions on the TeamCity server. Affected all versions through 2023.11.3!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/7DYva
πŸ‘‰ Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.11.3" NOT http.body:"2023.11.4"

Vendor's advisory: https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/
πŸ‘Ύ5πŸ”₯3πŸ‘2
Website update πŸ”₯

We have changed our website a little, and now you can find much more useful materials there, including use cases, links to our resources, and updated documentation.

πŸ‘‰πŸ» Read new docs and guides: https://docs.netlas.io/
πŸ‘Ύ4πŸ”₯2πŸ™1
CVE-2024-21899, -21900, -21901: Improper Authentication and other in QNAP NAS, 4.3 - 9.8 rating πŸ”₯

Code injection, execution of arbitrary commands and, most interestingly, a vulnerability in the authentication that allows an attacker to compromise the entire system via network.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/Wnycw
πŸ‘‰πŸ» Dork: http.body_sha256:4a1815f3e87d6d623c22921d9c39b2de614351d71831976bbc807f571953ff21

Vendor's advisory: https://www.qnap.com/en/security-advisory/qsa-24-09
πŸ”₯7πŸ‘Ύ2❀1πŸ™1
APSB24-05, APSB24-14: Multiple vulns in Adobe products, critical rating πŸ”₯

Two vulnerabilities from the new Adobe security bulletin, the exploitation of which will allow an attacker to achieve arbitrary file system read, code execution, and security feature bypass.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/EEZn7
πŸ‘‰πŸ» Dork: tag.name:"adobe_experience_manager" OR tag.name:"adobe_coldfusion"

Vendor's advisory: https://helpx.adobe.com/security/security-bulletin.html
πŸ‘Ύ4πŸ”₯3❀2
CVE-2024-23334: Path Traversal in aiohttp Python lib, 7.5 rating❗

An old vulnerability that has started to gain attention again recently. According to Cyble research, attackers have been scanning nodes with a vulnerable version of the library since the end of February. We recommend that everyone who uses it update immediately!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/lrzzv
πŸ‘‰ Dork: http.headers.server:"aiohttp"

Read more: https://www.bleepingcomputer.com/news/security/hackers-exploit-aiohttp-bug-to-find-vulnerable-networks/
πŸ‘Ύ5πŸ”₯3❀2πŸ‘2
🚧Planned update 🚧

The update will last 21.03.2024 from ~08:00 - 09:00 UTC ⏰, during which time the application will be unavailable.

Don't forget to save the results of your work before this.
πŸ‘Ύ3πŸ™2πŸ‘1πŸ”₯1
Media is too big
VIEW IN TELEGRAM
Major Attack Surface Discovery Tool updateπŸ”₯

New features:
- Grouping results;
- Group searches;
- Improved color segregation;
- Hiding excluded nodes;
- History tab;
and more.

πŸ‘‰ Read more: https://blog.netlas.io/major-update-for-attack-surface-discovery-tool-4ed4f1bc80fb
πŸ‘‰ Help topic: https://docs.netlas.io/easm/
πŸ‘‰ Try now: https://app.netlas.io/asd/

Come quickly and test the new functionality of Netlas! ✨
πŸ”₯5πŸ‘Ύ3❀1πŸ’‹1
How to find industrial objects with Netlas.io? 🏭

Short cheat sheet based on one of our articles. A few filters will allow you to make sure that nearby factories are protected.

πŸ‘‰ Read more about industrial devices search: https://medium.com/@netlas/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
πŸ”₯5πŸ‘Ύ4πŸ’‹1