Aggregator
CVE-2023-52752 | Linux Kernel up to 6.1.63/6.5.12/6.6.2 /proc/fs/cifs/DebugData cifs_debug_data_proc_show use after free (Nessus ID 208425)
CVE-2023-52916 | Linux Kernel up to 6.5 denial of service (c281355068bc / Nessus ID 208425)
CVE-2017-6841 | PoDoFo 0.9.5 graphicsstack.h ~TGraphicsStackElement null pointer dereference (Nessus ID 208427)
CVE-2017-6849 | PoDoFo 0.9.4 PdfColor.cpp ~PdfColorGray null pointer dereference (Nessus ID 208427)
CVE-2024-5535 | OpenSSL up to 3.3.1 Client Protocol SSL_select_next_proto client/client_len memory corruption (Nessus ID 208438)
CVE-2024-43483 | Microsoft .NET/.NET Framework/Visual Studio algorithmic complexity (Nessus ID 208439)
CVE-2024-43484 | Microsoft .NET/.NET Framework/Visual Studio algorithmic complexity (Nessus ID 208439)
CVE-2024-43485 | Microsoft .NET/Visual Studio algorithmic complexity (Nessus ID 208439)
CVE-2024-46292 | OWASP ModSecurity 3.0.12 Input name denial of service
CVE-2024-46304 | libcoap up to 4.3.5-rc2 src/coap_block.c coap_handle_request_put_block denial of service
Apple’s iPhone Mirroring Flaw Exposes Employee Privacy Risks
Цифровая изоляция: как Туркменистан оказался на дне мирового рейтинга интернета
CVE-2014-7522 | Maccabi Pakal 1.2 X.509 Certificate cryptographic issues (VU#582497)
Palo Alto Expedition: From N-Day to Full Compromise
On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it’s advertised as: The purpose of this tool is to help reduce the time and efforts of migrating a configuration from a supported vendor to Palo Alto Networks. By using Expedition, everyone can convert a configuration from Checkpoint, Cisco, or any other vendor to a PAN-OS and give you more time to improve the results. Further reading the documentation, it became clear that this application might have more attacker value than initially expected. The Expedition application is deployed on Ubuntu server, interacted with via a web service, and users remotely integrate vendor devices by adding each system’s credentials. Figure 1. Integrating a device with credentials This blog details finding CVE-2024-5910, but also how we ended up discovering 3 additional vulnerabilities which we reported to Palo Alto: CVE-2024-9464: Authenticated Command Injection CVE-2024-9465: Unauthenticated SQL Injection CVE-2024-9466: Cleartext Credentials in Logs CVE-2024-5910: No Reversing Needed Given the description of the vulnerability, it sounded like there existed some built in function that allowed reseting the admin credential. Missing authentication […]
The post Palo Alto Expedition: From N-Day to Full Compromise appeared first on Horizon3.ai.
The post Palo Alto Expedition: From N-Day to Full Compromise appeared first on Security Boulevard.