Command injection, SQLi, and hardcoded creds in Infoblox NETMRI. tsk tsk
https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2025-32814
https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2025-32813
https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2025-32815
OMG I almost missed the ../
https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2024-54188
And we have a write-up now for these Infoblox NetMRI vulns.
https://rhinosecuritylabs.com/research/infoblox-multiple-cves/
@cR0w i read this and it makes me want to grab the hoe and spade and go offline forever.
@cR0w This is even bigger clownshoes: https://<NETMRI_HOST>/webui/application/get_saml_request?saml_id=1%26http://$(whoami)
Are you kidding me
@mttaggart @cR0w I GET FREE ROOT YOU GET FREE ROOT EVERYBODY GETS FREE ROOT
@winterknight1337 @mttaggart @cR0w they're rooting for us.
@cR0w @winterknight1337 @mttaggart The 'strayan definition, right?
@cR0w i might have once coded root ssl key, company root to license products, in a binary, because Java is a shitshow, the Apache frameworkr are shitshows, the libraries are shitshows. Then why not coding shitshow... it was PR and Reviewed by two Seniors and the Lead, approved by the PM, and all the Company shitshow. I still can't believe it.