Netlas.io – Telegram
Netlas.io
2K subscribers
342 photos
3 videos
465 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
Unprotected databases with Netlas.io: Chapter 2 🔥

Since the publication of the previous article, databases have not ceased to be an important target for hackers. This is confirmed by our new publication, during the writing of which already hacked databases were found. Hurry up and check is your data save! 🔍

👉🏻 Read here: https://netlas.medium.com/how-to-find-unprotected-databases-with-netlas-io-chapter-2-ba71b07c9630
🔥5👾3
CVE-2023-22527: RCE in Atlassian Confluence, 10.0 rating 🔥

A template injection vulnerability allows attackers to perform RCE on vulnerable devices. Thousands of exploitation attempts by hackers have already been recorded

Search at Netlas.io:
👉 Link: https://nt.ls/e0S6w
👉 Dork: http.meta:"confluence-base-url"

Vendor's advisory: https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html
🔥4👾4
Our data just got better! 🔥

The Netlas team is pleased to announce that the DNS resolver* have been modified. The error is now less than 0.5% for any DNS record, which gives you much more accurate results.

In addition, improvements made it possible to collect a great number of records - almost 2.5 billion 📈

👉 Check it out in new datasets: https://app.netlas.io/datastore/

*DNS resolver - Netlas module responsible for collecting Domain Name System data.
👾4🔥2👍1
CVE-2024-23897: Critical vulnerability in Jenkins 🔥

Jenkins instances versions earlier than 2.441 are susceptible to a vulnerability that allows an attacker to read arbitrary files via the command line.

Search at Netlas.io:
👉 Link: https://nt.ls/z5QU0
👉 Dork: http.headers.x_jenkins:[0 TO 2.441]

Vendor's advisory: https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
👾42🔥2👍1🙏1
🚧 Technical works! 🚧

Due to network infrastructure upgrades, Netlas.io will be unavailable for some time.

Our team apologizes for this delay.

upd. Works are completed, Netlas is available again!
🔥5🙏5
CVE-2024-21690 and other: Multiple vuln in Junos OS, 8.8 rating❗️

Four vulnerabilities with ratings 5.3-8.8. XSS and missing authentication, which allow an attacker to execute commands with the rights of any user, including an administrator.

Search at Netlas.io:
👉🏻 Link: https://nt.ls/CpoFo
👉🏻 Dork: http.noscript:"Juniper"

Vendor's advisory: https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US
👾52👍2🤝1
CVE-2024-20931: Vulnerability in Oracle WebLogic, 7.5 rating❗️

A simple vulnerability allows an unauthenticated attacker to gain access to data on the server or perform RCE. PoC is now available!

Search at Netlas.io:
👉🏻 Link: https://nt.ls/P0M38
👉🏻 Dork: protocol:t3 OR protocol:t3s

Vendor's advisory: https://www.oracle.com/security-alerts/cpujan2024verbose.html
🔥5👾3🤝2
CVE-2024-22024: XXE in Ivanti Connect Secure, 8.8 rating❗️

The vulnerability allows an unauthenticated attacker to gain access to certain internal resources. According to Ivanti, the problem was found during an internal audit and has not yet been exploited.

Search at Netlas.io:
👉🏻 Link: https://nt.ls/0AKq9
👉🏻 Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
👍4👾3
Indicator Lifecycle completing with Netlas.io 🔥

We present to you an article from Adam Goss, in which the author reviewed a good use case for Netlas. In it you will learn how to use the ASD Tool in Threat Hunting 🔍

👉🏻 Read here: https://adamgoss.medium.com/netlas-io-a-powerful-suite-of-tools-for-threat-hunting-5aae7b6291a8

Enjoy reading!
👾5🔥42
CVE-2023-43770: Old XSS in Roundcube, that is being exploited now

A patch for this CVE appeared back in September, however, according to CISA, it is now actively used in attacks, allowing hackers to gain access to restricted information.

Search at Netlas.io:
👉 Link: https://nt.ls/LAQwc
👉 Dork: http.favicon.hash_sha256:20c30fd4340308d6a4ab222acae353fc2460793ac76645bb1ef1d9d61f4f0a9e

Read more: https://www.bleepingcomputer.com/news/security/cisa-roundcube-email-server-bug-now-exploited-in-attacks/
👾5👍3🔥21
CVE-2024-21410: 0day in MS Exchange, 9.8 rating 🔥

The vulnerability allows unauthenticated attackers to perform privilege escalation in NTLM relay attacks.

Search at Netlas.io:
👉🏻 Link: https://nt.ls/pR4S2
👉🏻 Dork: tag.name:"microsoft_exchange"

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
👾42🔥2👍1
How to find out what hardware is used in a certain plant How to assess the level of security of a certain area's critical infrastructure

About this in our new article dedicated to industrial software and devices 🔥

👉🏻 Read here: https://netlas.medium.com/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2

Enjoy reading!
👾5🔥31👍1
CVE-2024-1708, -1709: Auth Bypass in ConnectWise ScreenConnect, 10.0 rating 🔥🔥🔥

The vulnerability allows an attacker to perform RCE or edit sensitive data. PoC is now available!

Search at Netlas.io:
👉🏻 Link: https://nt.ls/Vbu6L
👉🏻 Dork: http.headers.server:"ScreenConnect"

Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
👾5🔥32🤯1
CVE-2024-21722, 723, 724, 25, 26: Multiple vulns in Joomla❗️

Five vulnerabilities have been discovered in the Joomla content management system that could be leveraged to execute arbitrary code on vulnerable websites.

Search at Netlas.io:
👉🏻 Link: https://nt.ls/dNRpZ
👉🏻 Dork: tag.name:"joomla"

Read more: https://www.bleepingcomputer.com/news/security/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks/
🔥6👾42🦄1
We regret to inform you that due to unforeseen network issues, Netlas.io is currently unavailable. Our team is actively working to resolve the issue and restore service as soon as possible. We apologize for any inconvenience caused and appreciate your patience and understanding. Stay tuned for updates. Thank you. 🙏
🙏4🕊3😢21
🚀 We're back online! Everything's running smoothly. Our team's investigating to prevent future incidents like this. Thanks for your patience! 🙌
🔥6👍2👾1
Interface update 💻

To separate the site menu and the application menu, a small visual update was released. In case you lost the ASD Tool after this, we inform you that it is now located on the top panel of the interface. You can see how to find it in the picture.

Good luck with your projects and thank you for using Netlas!
👾52👍1
How to find live cameras with Netlas - short cheatsheet 📑

A summary of one of our most popular articles in one picture. Traveling around the world through thousands of cameras - what could be more interesting? 🌏

👉 Read more here: https://medium.com/osint-ambition/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
5👾4🔥1
Fact: old SSL/TLS certificate threatens both the reputation of the website and the security of the data the user is working with

How to check the certificate for yourself or a contractor?

👉 Just use Netlas: https://app.netlas.io/certs/
👾31👍1
CVE-2024-27198, -27199: Auth Bypass in JetBrains TeamCity, 9.8 rating 🔥

The vulnerabilities may enable an attacker to bypass authentication checks and gain administrative permissions on the TeamCity server. Affected all versions through 2023.11.3!

Search at Netlas.io:
👉 Link: https://nt.ls/7DYva
👉 Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.11.3" NOT http.body:"2023.11.4"

Vendor's advisory: https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/
👾5🔥3👍2