Netlas.io
2.02K subscribers
342 photos
3 videos
465 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2023-3460: Privilege Escalation in UltimateMember WordPress plugin, 9.8 rating! πŸ”₯

A vulnerability has been observed for several versions of the plugin and is actively exploited by hackers.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/S9Skz
πŸ‘‰πŸ» Dork: http.body:"wp-content/plugins/ultimate-member"

Vendor's comments: https://wordpress.org/support/topic/cve-2023-3460/
πŸ‘Ύ4πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
The end of Beta Presale II is very close!

Hurry up to get Netlas.io subscription with a 50% discount, after 6 days the discount will be reduced ❗️

πŸ‘‰πŸ» Buy a subscription: https://app.netlas.io/plans/

In the near future, we'll also publish new features of Netlas.io (like in GIF). Sure you'll like them!
πŸ‘Ύ4πŸ‘¨β€πŸ’»1
Media is too big
VIEW IN TELEGRAM
A new tool in Netlas πŸ”₯

The search engine has received a new functionality - the Attack Surface Discovery tool. Check out Netlas.io to build your surfaces with our data!

Links:
πŸ‘‰πŸ» Tool: https://app.netlas.io/asd/
πŸ‘‰πŸ» Medium article: https://netlas.medium.com/netlas-io-attack-surface-discovery-tool-6fbd6b3e9706
πŸ‘‰πŸ» Overview video: https://youtu.be/98s-Iu5MyRw
πŸ”₯5πŸ†’2πŸ‘Ύ2
CVE-2023-34192: Reflected XSS in Zimbra Collaboration Suite, 9.0 rating! πŸ”₯

The vulnerability is actively exploited by hackers.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/ufPn6
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637

Read more: https://www.bleepingcomputer.com/news/security/zimbra-urges-admins-to-manually-fix-zero-day-exploited-in-attacks/
πŸ‘3πŸ‘Ύ3⚑1πŸ”₯1
CVE-2023-3519, -3466, -3467: Multiple vulns in Citrix Gateway/ADC, 9.8 rating πŸ”₯

Reflected XSS, privelege escalation, and unauth RCE which already exploiting!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/HB0b1
πŸ‘‰πŸ» Dork: http.title:"Citrix ADC" OR http.title:"Citrix Gateway"

Vendor's bulletin: https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
πŸ”₯2πŸ‘Ύ2
Share an attack surface graph

Did you notice share button appeared in Netlas.io Attack Surface Discovery tool? Here is OKX.com attack surface as they published on Hacker0x01 for example:

https://nt.ls/63dRu
https://hackerone.com/okx
πŸ‘Ύ5πŸ‘3
CVE-2023-35078: Ivanti EPMM Remote Unauthenticated API Access Vulnerability

🚨 PoC is already available for Ivanti Endpoint Manager Mobile API vuln CVE-2023-35078 (❗️CVSS 10.0❗️)
A limited number of customers have been impacted already πŸ˜–

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/QdWH7
πŸ‘‰πŸ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor’s advisory: https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability
πŸ‘Ύ3πŸ”₯2
☝🏻 Another one for the same product published today: CVE-2023-35082, CVSS 10.0

A second vulnerability affecting Ivanti EPMM (formerly MobileIron Core) API has been discovered today.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/QdWH7
πŸ‘‰πŸ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor’s advisory: https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
πŸ‘Ύ3πŸ”₯2πŸ€”1
There have been many requests to make CVE information available through a Freelancer subscription.

It's DONE! We hope this will make Netlas.io more useful to a wider range of users.

Sincerely yours, the Netlas.io Team
❀7πŸ‘Ύ4
CVE-2023-39143: RCE in PaperCut MF/NG, 8.4 rating πŸ”₯

Vuln enables unauthenticated attackers to potentially work with arbitrary files to the PaperCut MF/NG application server (< 21.2.3 version), resulting in RCE in certain configurations.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/ZGjrR
πŸ‘‰πŸ» Dork: (http.title:"PaperCut Login" AND (http.description:"PaperCut NG" OR http.description:"PaperCut MF")) OR (http.favicon.perceptual_hash:3e7e66667e7c6000)

Vendor's advisory: https://www.papercut.com/kb/Main/securitybulletinjuly2023/
πŸ‘Ύ3πŸ”₯2❀1πŸ‘1
CVE-2023-38035: Auth Bypass in Ivanti (MobileIron) Sentry, 9.8 rating πŸ”₯

The vulnerability allows unauthenticated attackers to access sensitive APIs on port 8443.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/CwTWz
πŸ‘‰ Dork: http.body:"images/sentry-mi-logo" AND port:8443

Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US
πŸ”₯2πŸ‘Ύ2πŸ‘1😁1
CVE-2023-40176, -40177, -40572, -40573: Multiple vuln in XWiki, 9.0-9.9 rating πŸ”₯

Fresh RCE, Privelege Escalation and stored XSS in XWiki Platform.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/SSzCU
πŸ‘‰ Dork: http.title:"XWiki" OR http.favicon.hash_sha256:6f0fdef9a229150fbc7183a1bbb136d7b44b6df7c34369c14bebb6adae8aaf20
πŸ‘Ύ3πŸ‘2❀1
CVE-2023-4596: RCE in Forminator plugin for WordPress, 9.8 rating πŸ”₯

The Forminator plugin in WP is vulnerable to arbitraty file upload for unauthenticated users, which may make RCE possible. PoC is available❗️

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/3Tgzc
πŸ‘‰πŸ» Dork: http.body:"/wp-content/plugins/forminator"

PoC is here: https://github.com/E1A/CVE-2023-4596
πŸ”₯3πŸ‘Ύ3πŸ‘1
CVE-2023-39361, -31132, -39359 and other: Multiple vuln (17 CVE's!) in Cacti, from 3.5 to 9.8 rating πŸ”₯

Stored XSS, SQL injection, RCE, Privilege Escalation... Vulnerabilities for every taste!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/tTozX
πŸ‘‰πŸ» Dork: http.title:"Login to Cacti"

Read more: https://github.com/Cacti/cacti/security
πŸ‘Ύ4🀯1
CVE-2023-36764: Elevation of Privilege in Microsoft SharePoint Server, 8.8 rating πŸ”₯

Attacker could gain administrator privileges by creating an ASP.NET page with specially-crafted declarative markup. Only authorization at the Site Member level is required.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/BBPrT
πŸ‘‰πŸ» Dork: http.headers.microsoftsharepointteamservices:*

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764
πŸ”₯2πŸ‘Ύ2πŸ‘1
After a long break, we are finally posting a new article πŸ”₯

This time we'll not talk about third-party tools, but specifically about Netlas.io. More precisely, about searching for live cameras using our tool πŸ“Ή

πŸ‘‰ Article: https://netlas.medium.com/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f

Enjoy reading!
πŸ‘Ύ9πŸ‘2❀1πŸ”₯1
CVE-2023-38204: Arbitrary code execution in Adobe ColdFusion, 9.8 rating πŸ”₯

Another vulnerability in ColdFusion. This time the reason was the vulnerability of some versions to Deserialization of Untrusted Data.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/adbcf
πŸ‘‰πŸ» Dork: tag.name:"adobe_coldfusion"

Vendor's advisory: https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html
πŸ‘Ύ7πŸ‘1
If you use Google Chrome as your main browser, we have great news for you πŸ”₯

Today we officially publish Netlas.io in browser extension format! Now users can explore the site they are on at any time with a couple of clicks. Find out potential vulnerabilities, host data, and much more.

πŸ‘‰πŸ» Read more: https://netlas.medium.com/netlas-io-chrome-extension-65a8e3d03bc0?postPublishedType=initial
πŸ‘‰πŸ» Extension: https://chrome.google.com/webstore/detail/netlasio/pncoieihjcmpooceknjajojehmhdedii?utm_source=ext_app_menu
πŸ‘Ύ6❀2
CVE-2023-29183: XSS in Fortinet/FortiProxy, 8.0 rating πŸ”₯

Some versions of Fortigate Fortinet and FortiProxy is vulnerable to an improper neutralization of input during web page generation, which allows an attacker to trigger malicious JavaScript code.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/he40Q
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f

Vendor's advisory: https://www.fortiguard.com/psirt/FG-IR-23-106
πŸ‘Ύ4πŸ‘1
We noticed that you were very interested in the article about live cameras. That's why its sequel is coming out πŸ”₯

Today we will touch on searching for cameras using Google Dorks, and will also talk about several special sites on which anyone can post their broadcast.

πŸ‘‰πŸ» Article: https://netlas.medium.com/how-to-find-online-cameras-with-google-29582e8372e0

Enjoy reading!
πŸ‘Ύ4πŸ‘2πŸ™2
CVE-2023-42793: auth bypass RCE in JetBrains TeamCity, 9.8 rating πŸ”₯

An authentication bypass vulnerability has been detected in TeamCity versions < 2023.05.04, which can lead to remote code execution.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/UM6CB
πŸ‘‰πŸ» Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.05.4"

Vendor's advisory: https://www.jetbrains.com/privacy-security/issues-fixed/
πŸ‘Ύ3πŸ‘1