Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 01/19/23 in all areas

  1. Exploiting vulnerability with 9.8 severity rating isn't particularly hard. More than 4,400 Internet-exposed servers are running versions of the Sophos Firewall that’s vulnerable to a critical exploit that allows hackers to execute malicious code, a researcher has warned. CVE-2022-3236 is a code-injection vulnerability allowing remote code execution in the User Portal and Webadmin of Sophos Firewalls. It carries a severity rating of 9.8 out of 10. When Sophos disclosed the vulnerability last September, the company warned it had been exploited in the wild as a zero-day. The security company urged customers to install a hotfix and, later on, a full-blown patch to prevent infection. According to recently published research, more than 4,400 servers running the Sophos firewall remain vulnerable. That accounts for about 6 percent of all Sophos firewalls, security firm VulnCheck said, citing figures from a search on Shodan. The researcher said he was able to create a working exploit for the vulnerability based on technical descriptions in this advisory from the Zero Day Initiative. The research's implicit warning: Should exploit code become public, there’s no shortage of servers that could be infected. Baines urged Sophos firewall users to ensure they’re patched. He also advised users of vulnerable servers to check for two indicators of possible compromise. The first is the log file located at: /logs/csc.log, and the second is /log/validationError.log. When either contains the_discriminator field in a login request, there likely was an attempt, successful or otherwise, to exploit the vulnerability, he said. The silver lining in the research is that mass exploitation isn’t likely because of a CAPTCHA that must be completed during authentication by web clients. In a statement, Sophos officials wrote: "Sophos took immediate steps to remediate this issue with an automated hotfix sent out in September 2022. We also alerted users who don't receive automatic hotfixes to apply the update themselves. The remaining 6% of the Internet-facing versions that Baines is guestimating in his article are running old, unsupported version of the software. This is a good opportunity to remind these users, as well as all users of any type of outdated software, to follow best security practices and upgrade to the most recent version available, like Sophos does on a regular basis with its customers." Via arstechnica.com
    1 point
  2. Pot să răspund doar la întrebări concrete, la care pot să ofer un răspuns fără să încalc termeni contractuali, de confidențialitate sau de bun simț. Asta este o opinie personală, nu pot să îți răspund la ea, dar mulțumesc pentru feedback.
    1 point
  3. Eu nu am auzit chestii de rau despre ei.
    1 point
  4. 1 point
  5. Salut ! Sunt student la informatică , iar în ultimele 4 luni am descoperit pentesting-ul. Am decis că asta vreau să fac pe viitor așa că am strâns bani și mi-am cumpărat cursul de la Offensive Security. Fiind destul de scump am cumpărat doar 30 de zile de laborator , 30 de zile în care m-am focusat să sparg cele 4 mașini ce dau bătăi de cap tuturor. Restul de mașini sparte au fost relativ ușurele ( searchsploit & exploit and that's it). La primul examen am reușit să sparg 2/5 , la a doua încercare 3/5. Stau foarte prost pe partea de web și mă întrebam dacă mă poate ajuta cineva cu niște sfaturi/cărți , orice lucru mărunt e de apreciat. Am mai întrebat persoane pe forum, dar am decis că mai ok e să postez aici. Mulțumesc mult!
    1 point
×
×
  • Create New...