Cybersecurity information flow

干净的信息流推送工具,偏向安全圈的点点滴滴,为安全研究人员每日发现优质内容.

了解更多 »

全部节点
时间 节点
2024年3月4日 09:35 The DFIR Report
Below is a recent Threat Brief that we shared with our customers. Each year, we produce over 50 detailed Threat Briefs, which follow a format similar to the below. Typically, … Read More
The post Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE appeared first on The DFIR Report.

" 以下是我们近期分享给客户的一份威胁简报。每年,我们都会编写超过50份详细的威胁简报,格式与以下类似。通常情况下,……了解更多\n\n威胁简报:WordPress漏洞导致Godzilla Web Shell,发现与新CVE\n\n首先,请关注The DFIR Report。"
2024年3月4日 07:35 CXSECURITY Database RSS Feed -
Topic: Petrol Pump Management Software v1.0 Remote Code Execution via File Upload Risk: High Text:# Exploit Title: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload # Date: 01-03-2024 # Exploit A...

" 主题:汽油泵管理软件v1.0 通过文件上传实现远程代码执行风险:高\n\n文本:# 漏洞名称:汽油泵管理软件v1.0 - 通过文件上传实现远程代码执行\n# 日期:2024年3月1日\n# 漏洞概述:..."
2024年3月4日 07:35 CXSECURITY Database RSS Feed -
Topic: GL.iNet AR300M v3.216 Remote Code Execution CVE-2023-46456 Exploit Risk: Low Text:#!/usr/bin/env python3 # Exploit Title: GL.iNet < = 3.216 Remote Code Execution via OpenVPN Client # Google Dork: intitle:"G...
2024年3月4日 07:35 CXSECURITY Database RSS Feed -
Topic: Enrollment System v1.0 SQL Injection Risk: Medium Text:# Exploit Title: Enrollment System v1.0 - SQL Injection # Date: 27 December 2023 # Exploit Author: Gnanaraj Mauviel (@0xm3m) ...
2024年3月4日 07:35 CXSECURITY Database RSS Feed -
Topic: Easywall 0.3.1 Authenticated Remote Command Execution Risk: High Text:# Exploit Title: Easywall 0.3.1 - Authenticated Remote Command Execution # Date: 30-11-2023 # Exploit Author: Melvin Mejia #...

" 主题:Easywall 0.3.1 认证远程命令执行风险:高\n\n文本:# 漏洞名称:Easywall 0.3.1 - 认证远程命令执行\n# 日期:2023年11月30日\n# 漏洞作者:Melvin Mejia\n# 简介:Easywall 0.3.1 版本存在认证远程命令执行漏洞,攻击者可通过此漏洞执行任意命令,对系统造成严重影响。\n\n译文:\n主题:Easywall 0.3.1 认证远程命令执行高风险\n\n文本:# 漏洞名称:Easywall 0.3.1 认证远程命令执行\n# 日期:2023年11月30日\n# 漏洞作者:Melvin Mejia\n# 简介:Easywall 0.3.1 版本存在认证远程命令执行漏洞,攻击者可通过此漏洞执行任意命令,对系统造成严重影响。"
2024年3月4日 06:31 Exploitalert
Enrollment System v1.0 SQL Injection
2024年3月4日 06:31 Exploitalert
Easywall 0.3.1 Authenticated Remote Command Execution

" Easywall 0.3.1 认证远程命令执行漏洞"
2024年3月4日 06:31 Exploitalert
Petrol Pump Management Software v1.0 Remote Code Execution via File Upload

" 汽油泵管理软件v1.0 通过文件上传实现远程代码执行漏洞"
2024年3月4日 06:31 Exploitalert
GL.iNet AR300M v3.216 Remote Code Execution CVE-2023-46456 Exploit
2024年3月4日 03:33 Blogs on dade
Untyped Python sucks. I’ve been writing Python for something like 10 years now, and looking back I can’t believe how bad the developer experience was compared to how it can be with appropriate type hinting. I noticed this recently while trying to work on a slack bot using the Slack Bolt SDK, which uses a decorator syntax to wrap functions to handle events, but what each event passes to the wrapped function is… well, it lacks some definition in the documentation.

" 无类型 Python 真的很糟糕。至今我已经写了大约 10 年的 Python,回顾过去,我不敢相信与适当类型提示相比,开发体验竟然如此之差。最近我注意到这一点,当时我试图使用 Slack Bolt SDK 开发一个 Slack 机器人,该 SDK 使用装饰器语法将处理事件的函数进行封装,但每个事件传递给封装函数的内容……好吧,在文档中缺乏一些定义。"
2024年3月4日 01:22 maple3142
這禮拜和 ${cystick} 參加了 osu!gaming CTF 2024,我只有隨便挑有興趣的題目做而已,而且題目整體難度不是很高,只選擇部分的題目寫 writeup。
2024年3月4日 00:13 Github_POC
Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
[GitHub]Vulnerability POC for CVE-2023-34845

" 布卢迪特(Bludit)v3.14.1被发现存在一个任意文件上传漏洞,位于组件/admin/new-content中。这个漏洞允许攻击者通过上传一个经过构造的SVG文件来执行任意Web脚本或HTML。请注意:该产品的安全模型是,管理员信任用户插入任意内容(用户不能通过自我注册创建自己的账户)。\n[GitHub] CVE-2023-34845漏洞证明示例"
2024年3月3日 23:50 HAHWUL
LLM 모델을 사용하는 서비스에선 Prompt Injection과 같은 LLM Attack을 방어, 완화하기 위해 여러가지 보호 로직을 가지고 있습니다. 그리고 이를 깨기 위해서 독창적인 방식의 Prompt가 필요합니다.
2024年3月3日 21:55 Github_POC
[GitHub]Vulnerability POC for CVE-2023-34845

" [GitHub] 针对CVE-2023-34845的安全漏洞证明示例"
2024年3月3日 21:52 Stories by SAFARAS K A on Medi
Hello hacker
Missed attending IWCON 2023 — the biggest virtual cybersecurity conference of the world?
No worries, we’re here at your service with a second chance.
Over the past few weeks, we’ve been sharing links to watch recordings of all our expert sessions. This is the final newsletter in the series.
Avinash Jain aka Logicbomb
Speaker bio: Blogger. Security Lead at Quince, ex-Microsoft
Topic name: Streamline security with shift left: A cloud approach
Follow the speaker on Twitter.
Video link
Watch video here
SG Harish
Speaker bio: AI Security Intern at Cisco , Author of Demystifying Broken Web Security!
Topic name: Hacking into Pretrained ML model
Follow the speaker on Twitter.
Video link
Watch video here
Yunus Aydin
Speaker bio: Application Security Engineer at Trendyol
Topic name: Bypassing Door Passwords
Follow the speaker on Twitter.
Video link
Watch video here
You can catch the entire playlist of the IWCON 2023 recorded sessions here.
Best
Editorial team,
Infosec Writeups
Missed IWCON 2023? Catch Reco
2024年3月3日 15:51 Jiajun的编程随想
《有GitHub Copilot?那就可以搭建你的ChatGPT4服务》我有Github Copilot,也订阅了GPT Plus,GPT Plus 20刀每月,我看了一下其实我用的不是特别多。本着开猿节流,降本增笑的精神,我停止续订了GPT Plus,并且着手于找到 GPT Plus 的替代方案...
2024年3月3日 10:13 Github_POC
A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device. This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.
[GitHub]CVE-2024-20291-POC exploit ---> RCE

" 在单独的NX-OS模式下,Cisco Nexus 3000和9000系列交换机的端口通道子接口访问控制列表(ACL)编程中的一个漏洞可能允许未经身份验证的远程攻击者通过受影响设备发送本应被阻止的流量。这个漏洞是由于在更改端口通道成员端口的配置时,发生的错误硬件编程导致的。攻击者可以通过尝试通过受影响设备发送流量来利用这个漏洞。成功的利用可能使攻击者能够访问应用了端口通道子接口上的ACL保护的网络资源。\n[GitHub]CVE-2024-20291-POC漏洞利用 ---> 远程代码执行(RCE)"
2024年3月3日 09:51 Github_POC
[GitHub]CVE-2024-20291-POC exploit ---> RCE
2024年3月3日 05:49 Stories by SAFARAS K A on Medi
How to avoid the 3 most common pitfalls of launching your Ethical Hacking career
Photo by Tim Gouw on Unsplash
Introduction
Greetings, Cyber Mavericks!
You’re on the path to becoming an ethical hacker (penetration tester), eager to pass the certification xyz and “accelerate” your journey to land a penetration tester role or become a h4x0r as soon as possible.
However, cutting corners now may lead to shaky foundations later, compromising your success and progression. You have effectively created your future weaknesses and blind spots.
Common Misconceptions
You can pass an ethical hacking exam without much prior Linux knowledge. “Just learn a little bit of Linux and you’ll be fine!”.
You don’t need to dive into networking, operating systems, databases, or web apps to be a pentester. “Just focus on those leet hacking courses!”.
And finally, “Just study the material in your course and you are good to go!”.
While certain certifications may be attainable without a firm grasp of foundational concepts, skimming throu
2024年3月2日 22:43 Github_POC
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.
[GitHub]Exploiting the pre-authentication code execution vulnerability found on RV130 cisco routers in 2019.

" 思科RV110W无线N VPN防火墙、思科RV130W无线N多功能VPN
2024年3月2日 15:51 Github_POC
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
[GitHub]CVE-2024-1709 ConnectWise ScreenConnect auth bypass patch WORK 2.0

" ConnectWise ScreenConnect 23.9.7及更早版本受到使用替代路径或通道的认证绕过漏洞影响,这可能允许攻击者直接访问机密信息或关键系统。\n[GitHub] CVE-2024-1709 ConnectWise ScreenConnect认证绕过修复WORK 2.0"
2024年3月2日 11:42 胡涂说
年初闲来无事,看别人的总结。其中DIYGod的总结让我印象很深刻,他每年给自己制定OKR,其中KR部分很详细,且Smart化,这种将自己的生活量化规划的方式是个不错的实践,因此我也尝试着按照健康、家庭、成长、工作几个方面来规划OKR,在家庭Objective一项分解的KR里,列上“今年安排家庭旅游至少3次”,因此也想利用下春节假期来实现第一个KR,跟妻子商量目的地,在泰国、哈尔滨等地纠结了几天后,终于在临春节前几天定下去云南。
2024年3月2日 10:13 Github_POC
This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://con
[Gi
2024年3月2日 10:12 Github_POC
Microsoft Exchange Server Elevation of Privilege Vulnerability
[GitHub]Microsoft Exchange server Privilege Escalation - WORK!!

" Microsoft Exchange服务器权限提升漏洞\n[GitHub] Microsoft Exchange服务器权限提升 - 有效!"
2024年3月2日 10:12 Github_POC
A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited.
[GitHub]ArcSight ESM up to 24.0 information disclosure proof-of-concept

" 一种潜在的安全漏洞已在OpenText/Micro Focus ArcSight企业安全经理(ESM)中被发现。该漏洞可能被远程 exploit。\n[GitHub] ArcSight ESM 截至24.0版本的信息泄露概念验证"
2024年3月2日 09:50 Github_POC
A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests
[GitHub]CVE-2024-21762 proof of concept is an exploitation out of bound write vulnerability in fortinet SSL VPN which leads to unauthenticated RCE if successfully explited.

" 在Fortinet FortiOS版本7.4.0至7.4.2、7.2.0至7.2.6、7.0.0至7.0.13、6.4.0至6.4.14、6.2.0至6.2.15、6.0.0至6.0.17,以及FortiProxy版本7.4.0至7.4.2、7.2.0至7.2.8、7.0.0至7.0.14、2.0.0至2.0.13、1.2.0至1.2.13、1.1.0至1.1.6、1.0.0至1.0.7中,存在边界外写入漏洞。攻击者可通过特定构造的请求执行未经授权的代码或命令。\n\n[GitHub]CVE-2024-21762证明概念是一种利用Fortinet SSL VPN中的边界外写入漏洞,如果成功利用,将导致未经身份验证的远程代码执行。"
2024年3月2日 09:50 Github_POC
[GitHub]POC for CVE-2024-21672

" [GitHub] 针对CVE-2024-21672的POC(证明概念)"
2024年3月2日 09:50 Github_POC
[GitHub]Microsoft Exchange server Privilege Escalation - WORK!!

" [GitHub] Microsoft Exchange服务器权限提升 - 有效!"
2024年3月2日 09:50 Github_POC
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later
[GitHub]POC for CVE-2023-47218

" 已报告称,一种操作系统命令注入漏洞影响了多个QNAP操作系统版本。如果被利用,此漏洞可能允许用户通过网络执行命令。我们已在以下版本中修复了该漏洞:QTS 5.1.5.2645 build 20240116及以后的版本,QuTS hero h5.1.5.2647 build 20240118及以后的版本,以及QuTScloud c5.1.5.2651及以后的版本。\n[GitHub] CVE-2023-47218的POC(证明概念代码)"
2024年3月2日 09:50 Github_POC
[GitHub]ArcSight ESM up to 24.0 information disclosure proof-of-concept

" [GitHub] ArcSight ESM高达24.0版本的信息泄露概念验证"