Security Practitioner

SEARCH

CATEGORIES

TAGS

    Apache CVE-2021-41773, CVE-2021-42013

    October 18, 2021
    We wanted to do something a little bit different with this post. Our vulnerability disclosures, exploit proof-of-concepts, and attack analysis blog posts have been awesome, but they have been catering to an offensive security audience.

    Exposed & Exploited

    October 16, 2021
    While so many are focused on vulnerabilities and malware on endpoints, understanding the attack paths an attacker would exploit to hold your business and brand at risk is key.
    Whitepaper: Exposed and Exploited

    Compromising vCenter via SAML Certificates

    October 4, 2021
    Overview A common attack path that Horizon3 has identified across many of its customers is abusing access to the VMware vCenter Identity Provider (IdP) certificate. Security Assertion Markup Language (SAML) has proved to be a hotbed of vulnerabilities within the last year, as well as a target of many cybercrime syndicates and APTs. In the…
    Compromising vCenter via SAML Certificates

    OMIGOD – RCE Vulnerability in Multiple Azure Linux Deployments

    September 16, 2021
    Overview On September 14, multiple vulnerabilities were discovered by researchers at Wiz.io. The most critical of them being CVE-2021-38647, now dubbed OMIGOD, which effects the Open Management Infrastructure (OMI) agent in versions 1.6.8.0 and below. Azure customers effected by this vulnerability are still vulnerable and must take manual action to ensure the OMI agent is updated.…

    Confluence Server OGNL Injection: CVE-2021-26084

    September 13, 2021
    On August 25, 2021, Atlassian released a security advisory for CVE-2021-26084, an OGNL injection vulnerability found within a component of Confluence Server and Data Center. This critical vulnerability allows an unauthenticated attacker to execute arbitrary commands on the server. A few days later, on August 31, security researchers @iamnoob and @rootxharsh quickly developed a working proof of concept given the vulnerability…

    ProxyShell: More Ways for More Shells

    September 4, 2021
    In August, Orange Tsai released details and also spoke at BlackHat and DEFCON detailing his security research into Microsoft Exchange. His latest blog post details a series of vulnerabilities dubbed ProxyShell. ProxyShell is a chain of three vulnerabilities: CVE-2021-34473 - Pre-auth Path Confusion leads to ACL Bypass CVE-2021-34523 - Elevation of Privilege on Exchange PowerShell Backend CVE-2021-31207 - Post-auth Arbitrary-File-Write leads to…
    Terminal green binary code in the shape of a piece of mail

    Tech Talk: Compliance in Security

    In the world of network security, compliance is the bare minimum. Compliance is locking your door, but what about your windows?
    Compliance in Security Tech Talk

    CVE-2021-27927: CSRF to RCE Chain in Zabbix

    March 8, 2021
    Zabbix is an enterprise IT network and application monitoring solution. In a routine review of its source code, we discovered a CSRF (cross-site request forgery) vulnerability in the authentication component of the Zabbix UI. Using this vulnerability, an unauthenticated attacker can take over the Zabbix administrator's account if the attacker can persuade the Zabbix administrator…

    POC CVE-2021-21972

    February 24, 2021
    Write the file supplied in the --file argument to the location specified in the --path argument. The file will be written in the context of the vsphere-ui user. If the target is vulnerable, but the exploit fails, it is likely that the vsphere-ui user does not have permissions to write to the specified path.
    Proof of Concept Exploit

    CVE-2020-35700: Exploiting a Second-Order SQL Injection in LibreNMS < 21.1.0

    February 7, 2021
    LibreNMS is an open source solution for network monitoring based on PHP, MySQL and SNMP. While reviewing its source code, we discovered a second-order SQL injection vulnerability, CVE-2020-35700, in the Dashboard feature. This vulnerability is exploitable by any authenticated user inside LibreNMS. The vulnerability is fixed in LibreNMS 21.1.0.