Netlas.io
2.02K subscribers
342 photos
3 videos
465 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
SecurePoint Authentication vulnerability

"If you sit on the river bank for a long time, you can see how the sessionId of the administrator floats by"
- Sun Tzu.

CVE-2023-22620 requires a bit of patience as the attacker has to wait for the administrator to log in, catch his sessionId, and brute force the User-Agent. However, after that, this will give full control over the root panel of the firewall.

Look at Netlas.io:
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:ebaaed8ab7c21856f888117edaf342f6bc10335106ed907f95787b69878d9d9e
πŸ‘‰πŸ» Search: nt.ls/k9W35

Original article: https://www.rcesecurity.com/2023/04/securepwn-part-1-bypassing-securepoint-utms-authentication-cve-2023-22620/
πŸ”₯4❀1πŸ‘Ύ1
CVE-2023-25135: pre-authentication RCE in vBulletin with 9.8 rating πŸ”₯

More than a month ago specialists from LexfoSecurite discovered an interesting vulnerability. It is still highly relevant.
‼️POC was published two days ago ‼️

Search on Netlas.io:
πŸ‘‰πŸ» Dork: tag.vbulletin.version:<=5.6.9
πŸ‘‰πŸ» Search: https://nt.ls/14sXQ

Original article: https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable
πŸ”₯4
A big list of dorks for Netlas.io has been published on GitHub!

Link: https://github.com/netlas-io/netlas-dorks
☝️ Use it to find IoT elements, monitoring systems, and more.

Over time, this list will grow. You can also send us your dorks, and we will add them. Good hunting! πŸ”
πŸ‘Ύ4πŸ‘3πŸ‘1
πŸ”₯πŸ–¨πŸ”₯ PaperCut MF/NG RCE, rating 9.8

Vulnerabilities CVE-2023-27350 and CVE-2023-27351 discovered a few days ago allows unauthorized code execution in the SYSTEM context for PaperCut print management software. The software is used internally in most cases. And yet there are 1,1K instances exposed to the Internet.

Search on Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/ZGjrR

Vendor’s advisory: https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
πŸ‘Ύ4πŸ‘1πŸ”₯1
CVE-2023-27524: session validation attacks on Apache Superset with 8.9 ratings ‼️

Search vuln on Netlas.io:
πŸ‘‰πŸ» Dork: (http.title:superset http.body:SUPERSET_WEBSERVER*) OR http.favicon.hash_sha256:e186603e51173d86bfc680eee24345d67c7a1d945a8e76dc4b218bbfabed666e
πŸ‘‰πŸ» Link: https://nt.ls/XdO7p

Check if your software is vulnerable with a script from Horizon3 researchers: https://github.com/horizon3ai/CVE-2023-27524
πŸ‘Ύ4❀1πŸ‘1
Netlas module for Uncover

We hasten to share with you a short instruction on using the Netlas.io module integrated into Uncover from ProjectDiscovery.

πŸ‘‰πŸ» Read how to use it here:
https://netlas.medium.com/using-uncover-with-netlas-io-module-77b82157ccc4
πŸ‘6πŸ‘Ύ1
Netlas is the sponsor of osintomatico conference

Do you love OSINT? So, then we have great news for you: Netlas became one of the sponsors of the osintomatico conf!

Soon, 10 CTF winners will receive certificates from us for a thousand bonus points to immerse deeper in research using our tool. Good luck to the participants!

Explore the event πŸ‘‰ 2023.osintomatico.com
πŸ†2πŸ‘Ύ2πŸ‘1πŸ”₯1
CVE-2023-25717: Ruckus Wireless Admin RCE with 9.8 rating πŸ”₯

An old vulnerability that got a second chance with the advent of a new botnet type running through it.

Search on Netlas.io:
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:44648ca99e1d18589d4b72b19156bf61117c09e311b9f26fa771d9acf5cf463f
πŸ‘‰πŸ» Link: https://nt.ls/s1WYE

Read more about new botnet in the Fortinet article: https://www.fortinet.com/blog/threat-research/andoryubot-new-botnet-campaign-targets-ruckus-wireless-admin-remote-code-execution-vulnerability-cve-2023-25717
πŸ‘Ύ4
Netlas module for OWASP Amass

We continue to tell you about the tools in which Netlas.io is integrated in one way or another.
And today, the well-known OWASP Amass is next in line!

Read here πŸ‘‰πŸ» https://netlas.medium.com/using-owasp-amass-with-netlas-io-module-cb7308669ecd
πŸ‘Ύ6πŸ‘2
CVE-2023-20159, CVE-2023-20160, CVE-2023-20161, CVE-2023-20189: Multiple vulns on the Cisco Small Business Switches. 8.6 rating ❗️

An attacker can cause DoS or perform remote code execution with root user rights. POC is available!

Search on Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/eIvyW
πŸ‘‰πŸ» Dork: http.favicon.perceptual_hash:ffdb0113090009ff~1 AND http.body:"Small Business"
πŸ”₯4πŸ‘Ύ2
CVE-2023-25690: Request Smuggling attack on Apache HTTP Server with 9.8 rating πŸ”₯

An old vulnerability, but a POC has been published today.

Search on Netlas.io (over 20 million results):
πŸ‘‰πŸ» Link (with tags): https://nt.ls/bGPCz
πŸ‘‰πŸ» Link (without tags): https://nt.ls/0Xh1g
πŸ‘‰πŸ» Dork: tag.name:"apache" AND (tag.apache.version:>=2.4.0 AND tag.apache.version:<=2.4.55)
πŸ‘Ύ3πŸ€·β€β™‚1πŸ‘1
This Friday we want to share an interesting guide to using Netlas.io for bug bounties. The authors have done a big job, and now you can look at the results of their labor and appreciate possibilities of Netlas.

πŸ‘‰πŸ» Part 1: https://youtu.be/lJFXNthSVko
πŸ‘‰πŸ» Part 2: https://youtu.be/wHrn0EJOFfI
πŸ‘‰πŸ» Part 3: https://youtu.be/pwUrHGg53Jw

Thanks to ValluvarSploit and _mohd_saqlain for creating the guide and permission to post it!
πŸ‘Ύ8
Using Netlas.io within Tines automations

This time we will tell you about working with Tines platform and the Netlas.io tools integrated into it. A little automation never hurt anyone :)

Read here πŸ‘‰πŸ»
https://medium.com/@netlas/using-netlas-io-within-tines-automations-31518289e5e3
πŸ‘Ύ4πŸ‘1
Dork list for Netlas.io has been updated on GitHub!

Two new categories: "Web cameras" and "VoIP", have been added, and old ones have been supplemented.

πŸ‘‰πŸ» Link: https://github.com/netlas-io/netlas-dorks

Some new queries just waiting for you to test them.
πŸ‘3πŸ‘Ύ3
CVE-2023-25157: SQL injection for GeoServer, 9.8 rating πŸ”₯

An old vulnerability with working PoC.

Search at Netlas.io:
πŸ‘‰πŸ» Dork: http.title:"geoserver"
πŸ‘‰πŸ» Link: https://nt.ls/g7sTM

Vendor's advisory: https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf
πŸ‘Ύ3πŸ‘1
CVE-2023-33778: Hard-coded creds in Draytek Vigor Routers, 9.8 rating πŸ”₯

Attackers can bind any affected device to their own account. PoC is available!

Search at Netlas.io:
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:0af4f089d58e919f4ee421727e9ac54d885d6b3b05ec16e4d94b703f45c7eef9
πŸ‘‰πŸ» Link: https://nt.ls/NbBpK

PoC and more information: https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef
πŸ‘Ύ4πŸ”₯1
CVE-2023-27997: Pre-authentication RCE on Fortigate VPN, 9.8 rating πŸ”₯

Heap overflow, vulnerability potentially affecting multiple versions.

Search at Netlas.io:
πŸ‘‰πŸ» Link with tags (recommended): https://nt.ls/jOlSo
πŸ‘‰πŸ» Link without tags (less precision): https://nt.ls/3NrQW

Read detailed analysis by LexfoSecurity: https://blog.lexfo.fr/xortigate-cve-2023-27997.html
πŸ‘Ύ5πŸ”₯2
CVE-2023-3128: Authentication Bypass in Grafana, 9.4 rating ❗️
CVE vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

During Grafana's Azure AD account validation, an attacker can spoof the profile email field and hijack the account.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/iqMVz
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:80a7f87a79169cf0ac1ed3250d7c509368190a97bc7182cd4705deb8f8c70174 AND http.title:"Grafana"
πŸ‘Ύ4πŸ”₯2
CVE-2023-36630: Privilege Escalation and Authentication Bypass in CloudPanel, critical rating πŸ”₯

Fresh vulnerability based on insecure file uploads.

Search at Netlas.io:
πŸ‘‰πŸ» Link: nt.ls/V3hEn
πŸ‘‰πŸ» Dork: http.title:"cloudpanel" NOT http.body:"2.3.1"

Read vendor's changelog: https://www.cloudpanel.io/docs/v2/changelog/
πŸ‘Ύ5πŸ”₯1
CVE-2023-3460: Privilege Escalation in UltimateMember WordPress plugin, 9.8 rating! πŸ”₯

A vulnerability has been observed for several versions of the plugin and is actively exploited by hackers.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/S9Skz
πŸ‘‰πŸ» Dork: http.body:"wp-content/plugins/ultimate-member"

Vendor's comments: https://wordpress.org/support/topic/cve-2023-3460/
πŸ‘Ύ4πŸ”₯1