Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
/ Vulnerabilities Identified in LG WebOS

WebOS versions 4 through 7 running on LG TVs. These vulnerabilities let us gain root access on the TV after bypassing the authorization mechanism. Although the vulnerable service is intended for LAN access only, so.. Internet-connected devices, identified over 91,000 devices:

https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/
/ Unauthenticated attacker can execute arbitrary code via FortiClientLinux

[FortiClient Linux] Remote Code Execution due to dangerous nodejs configuration. Official advisory:

https://www.fortiguard.com/psirt/FG-IR-23-087
/ CVE-2024-3273: D-Link NAS RCE Exploited in the Wild

A remote code execution vulnerability in D-Link NAS devices is actively being exploited and is tracked under CVE-2024-3273. The vulnerability is believed to affect as many as 92,000 devices

https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild
CISSP Cheat Sheet Series.pdf
573.1 KB
/ Security & Risk Management (CISSP Cheat Sheet)

Covers a range of key topics:

- Domain 1: Security and Risk Management
- Domain 2: Asset Security
- Domain 3: Security Architecture and Engineering
- Domain 4: Communication and Network Security
- Domain 5: Identity and Access Management
- Domain 6: Security Assessment and Testing
- Domain 7: Security Operations
- Domain 8: Software Development Security
BatBadBut: You can't securely execute commands on Windows

The root cause of BatBadBut is the overlooked behavior of the CreateProcess function on Windows.

When executing batch files with the CreateProcess function, Windows implicitly spawns cmd.exe because Windows can’t execute batch files without it:

https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
JetBrains следуя практикам поддержки Open Source, в этом году поддержал OpenBLD.net и меня новой лицензией

JetBrains - это первая компания, которая поддержала мою инициативу на пути создания моих открытых проектов. Такая поддержка, явилась значимой для меня, моей мотивации и движения вперед. Благодаря таким активностям ты понимаешь, что не тратишь время впустую, что не тянешь это все в одну упряжку, есть те, кто понимает тебя, кто поддерживает тебя и твои идеи и это делает тебя еще сильнее и еще ближе на пути достижения поставленных целей и реализации твоих идей.

Это круто, это приятно и это дает возможность двигаться еще дальше, чем ты есть на сегодня.

Всем кто имеет возможность оказывать помощь людям и проектам в их развитии и поддерживает и оказывает - посвящается. Успехов всем нам! Peace ✌️

JetBrains OSS - https://www.jetbrains.com/opensource/
100 web vulnerabilities, categorized into various types.pdf
430.2 KB
Simple categorized list of vulnerability types.
CSI-DEPLOYING-AI-SYSTEMS-SECURELY.pdf
494 KB
Best Practices for Deploying Secure and Resilient AI Systems

from Canadian Centre for Cyber Security
/ flatpak CVE-2024-32462 : Sandbox escape via RequestBackground

https://www.openwall.com/lists/oss-security/2024/04/18/5
/ The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to
crash an application or overwrite a neighbouring variable.

https://sourceware.org/pipermail/libc-announce/2024/000040.html

a new exploitation technique that affects the whole PHP ecosystem, and the compromission of several applications.

CVE-2024-2961

https://security-tracker.debian.org/tracker/CVE-2024-2961
MagicDot: A Hacker’s Magic Show of Disappearing Dots and Spaces

This action is completed by most user-space APIs in Windows. By exploiting this known issue, I was able to uncover:

🔹 One remote code execution (RCE) vulnerability (CVE-2023-36396) in Windows’s new extraction logic for all newly supported archive types that allowed me to craft a malicious archive that would write anywhere I chose on a remote computer once extracted, leading to code execution.
🔹 Two elevation of privilege (EoP) vulnerabilities: one (CVE-2023-32054) that allowed me to write into files without the required privileges by manipulating the restoration process of a previous version from a shadow copy and another that allowed me to delete files without the required privileges.

With Demo..:

https://www.safebreach.com/blog/magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces/
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM

https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/

P.S. Thx for the link dear subscriber ✌️
lnav - A log file viewer for the terminal

https://lnav.org/