Posts
2711
Following
681
Followers
1505
"I'm interested in all kinds of astronomy."
repeated

Almost exactly a year ago, Rapid7 put out a technical analysis of Apache 2 CVE-2023-50164 that said:

* Exploit payloads were going to need to be customized to the target

* It wasn't clear that there was any critical mass of remotely exploitable applications out of the box

* The reports of exploitation in the wild all appeared to be unsuccessful attempts rather than IRL compromises of production systems.

https://attackerkb.com/topics/pe3CCtOE81/cve-2023-50164/rapid7-analysis

Fast-forward to CVE-2024-53677 and we can repeat the above verbatim, with one pretty notable exception — the "fixed" version that ostensibly remediates the vulnerability actually doesn't, and code-level changes are required (to migrate away from the vulnerable file upload interceptor) to actually remediate it. Also the "fixed" release (6.4.0) appears to have gone out a year ago? No idea. Big ups to @fuzz for the analysis!

https://attackerkb.com/assessments/28f08c0a-702c-4ab0-99cb-eea00202fa2c

2
5
0
repeated

CVE-2023-34990 is credited to @hacks_zach of Horizon3.ai. This gave me a starting point for figuring out where to look for information. It's contained in Fortinet FortiWLM Deep-Dive, IOCs, and the Almost Story of the “Forti Forty” posted on 14 March 2024.

It is described as an unpatched vulnerability: "Unauthenticated Limited Log File Read – Allows retrieval of arbitrary log files which contain administrator session ID tokens" Check out the Path to Remote Code Execution #2 section for vulnerability details:

This vulnerability allows remote, unauthenticated attackers to access and abuse builtin functionality meant to read specific log files on the system via a crafted request to the /ems/cgi-bin/ezrf_lighttpd.cgi endpoint. This issue results from the lack of input validation on request parameters allowing an attacker to traverse directories and read any log file on the system.

Based on the details of the blog, I can confidently say that the new CVE and the blog's vulnerability are almost certainly one and the same.

cc: @GossiTheDog @jerry

2
4
0
repeated
repeated

@cR0w I found it. I found the vulnerability details: https://www.horizon3.ai/attack-research/disclosures/fortiwlm-the-almost-story-for-the-forti-forty
Unauthenticated Limited Log File Read – Allows retrieval of arbitrary log files which contain administrator session ID tokens

"CVE-2024-???? (0-day): Fortinet FortiWLM Unauthenticated Limited File Read Vulnerability"

This vulnerability allows remote, unauthenticated attackers to access and abuse builtin functionality meant to read specific log files on the system via a crafted request to the /ems/cgi-bin/ezrf_lighttpd.cgi endpoint. This issue results from the lack of input validation on request parameters allowing an attacker to traverse directories and read any log file on the system.

0
3
0
repeated

If you are wondering about the unpublished CVE-2024-49848... there is a PoC.

🔗 https://vulnerability.circl.lu/comment/23fd524b-475e-4b9f-8dc2-7b67f4cec409

0
4
0
As a paying subscriber I want to hide news stories without an identified author.
1
0
4
US Probes China-Founded Router Maker TP-Link on National Security Fears - Bloomberg

https://www.bloomberg.com/news/articles/2024-12-18/us-probes-china-founded-router-maker-on-national-security-fears

TP-Link about join the club of Huawei&Kaspersky

#frombsky
1
1
1
repeated

UK: “It’s still illegal to rip a CD you legally own to MP3!”

Also UK: “Hey, let’s exempt those AI guys from copyright law!”

FFS.

https://www.gov.uk/government/consultations/copyright-and-artificial-intelligence

6
12
0
repeated

Learn about XSS for XMAS!

We created a new MDN page about Cross-site scripting: https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/XSS

0
2
0
repeated

Here is another challenge. This time I am quite sure that no text or marking needs to be blurred.
Do you know what this thing is? Can you name the exact part number or product name?

As always, explain your guess/deduction and hide it behind a CW to not spoil others.

3
1
0
Maybe it is my bad English/ears but I can't ignore hearing the name of Enno Rey instead of the track title :S

https://www.youtube.com/watch?v=0f_TbyIIPnc

#hardstyle
1
0
1
repeated

game i would like to play: Factorio but you *only* do compliance paperwork

4
1
1
repeated

I am mildly amused that OpenAI telemetry rollout led to a classical Kubernetes control plane DoS.

In my experience DDoSing your own control plane is the #1 way people generate large failures in K8s. What are others?

1
2
0
[RSS] The Full Story of CVE-2024-6386: Remote Code Execution in WPML

https://blog.wpsec.com/the-full-story-of-cve-2024-6386-remote-code-execution-in-wpml/
0
0
0
repeated

Hey y'all,

the https://madweb.work/ Program Committee was just announced (featuring yours truly).
Please remember to submit your papers about web security by January 9th 2025. We are interested in research at the junction of web & browser security. More on the website :)

0
3
0
@Viss one of them must have cheated (probably the guy)
1
0
1
[RSS] Having Fun with Flare-on Using Time-Travel Debugging (TTD)

https://binary.ninja/2024/12/16/flareon-ttd.html
0
1
2
[RSS] Authentication Bypass Vulnerability in Philips IntelliSpace Cardiovascular

https://outurnate.com/authentication-bypass-vulnerability-in-philips-intellispace-cardiovascular
0
0
1
Show older