Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 02/15/23 in all areas

  1. boti rusi... fmm de pidari " mjy-dr.-adrian-cacoveanu-vinovaii-pentru-starea-de-fapt-in-pandemie" nici sa scrieti corect nu stiti.
    1 point
  2. Exploit code has been released for an actively exploited zero-day vulnerability affecting Internet-exposed GoAnywhere MFT administrator consoles. GoAnywhere MFT is a web-based and managed file transfer tool designed to help organizations to transfer files securely with partners and keep audit logs of who accessed the shared files. Its developer is Fortra (formerly known as HelpSystems), the outfit behind the widely abused Cobalt Strike threat emulation tool. On Monday, security researcher Florian Hauser of IT security consulting firm Code White released technical details and proof-of-concept exploit code that performs unauthenticated remote code execution on vulnerable GoAnywhere MFT servers. Fortra says that "the attack vector of this exploit requires access to the administrative console of the application, which in most cases is accessible only from within a private company network, through VPN, or by allow-listed IP addresses (when running in cloud environments, such as Azure or AWS)." However, a Shodan scan shows that almost 1,000 GoAnywhere instances are exposed on the Internet, although just over 140 are on ports 8000 and 8001 (the ones used by the vulnerable admin console). Map of vulnerable GoAnywhere MFT servers (Shodan) Mitigation available The company is yet to publicly acknowledge this remote pre-authentication RCE security flaw exploited in attacks (to read the advisory, you need to create a free account first) and hasn't released security updates to address the vulnerability, thus leaving all exposed installations vulnerable to attacks. However, the private advisory provides indicators of compromise, including a specific stacktrace that shows up in the logs on compromised systems. It also contains mitigation advice that includes implementing access controls to allow access to the GoAnywhere MFT administrative interface only from trusted sources or disabling the licensing service. To disable the licensing server, admins have to comment out or delete the servlet and servlet-mapping configuration for the License Response Servlet in the web.xml file to disable the vulnerable endpoint. A restart is required to apply the new configuration. Code to remove/comment out to disable GoAnywhere MFT's licensing service "Due to the fact that data in your environment could have been accessed or exported, you should determine whether you have stored credentials for other systems in the environment and make sure those credentials have been revoked," Fortra added in an update issued on Saturday. "This includes passwords and keys used to access any external systems with which GoAnywhere is integrated. "Ensure that all credentials have been revoked from those external systems and review relevant access logs related to those systems. This also includes passwords and keys used to encrypt files within the system." Fortra also recommends taking the following measures after mitigation in environments with suspicion or evidence of an attack: Rotate your Master Encryption Key. Reset credentials - keys and/or passwords - for all external trading partners/systems. Review audit logs and delete any suspicious admin and/or web user accounts Contact support via the portal https://my.goanywhere.com/, email goanywhere.support@helpsystems.com, or phone 402-944-4242 for further assistance. Via bleepingcomputer.com
    1 point
  3. Te pot ajuta eu gratis pe baza imei Contacteaza-ma la: poancaflorian@gmail.com
    1 point
  4. DSLCAD is a programming language & interpreter for building 3D models. Inspired by OpenSCAD, it has a language and 3D viewer to simplify the modeling experience. Usage Check out the documentation pages. Installation Download the latest DSLCAD from the Releases tab of this repo. You can find pre-built binaries for: Windows MacOS Linux FAQ Why is this different from OpenSCAD? DSLCAD aims to build upon the formula that was established by OpenSCAD. It is still functional in approach and has a more limited scope (no text editor). It has a viewer for rapid part development and a CLI for automation. It offers some novel ideas such as: chamfer and fillet operators to simplify part creation the ability to create multiple parts (3D models) from a single file object style properties to access variables my_gear.radius top to bottom readability using pipes (the -> operator) to reduce nesting complexity a single binary per platform for portability focused workflow with the aim of using the 2D first then 3D part design flow written in Rust to make it easy to build and contribute to Download: dslcad-master.zip or git clone https://github.com/DSchroer/dslcad.git Source
    1 point
  5. Title: SOUND4 LinkAndShare Transmitter 1.1.2 Format String Stack Buffer Overflow Advisory ID: ZSL-2023-5744 Type: Local Impact: System Access, DoS, Exposure of System Information Risk: (4/5) Release Date: 08.02.2023 Summary The SOUND4 Link&Share (L&S) is a simple and open protocol that allow users to remotely control SOUND4 processors through a network connection. SOUND4 offers a tool that manage sending L&S commands to your processors: the Link&Share Transmitter. Description The application suffers from a format string memory leak and stack buffer overflow vulnerability because it fails to properly sanitize user supplied input when calling the getenv() function from MSVCR120.DLL resulting in a crash overflowing the memory stack and leaking sensitive information. The attacker can abuse the username environment variable to trigger and potentially execute code on the affected system. -------------------------------------------------------------------------------- (4224.59e8): Security check failure or stack buffer overrun - code c0000409 (!!! second chance !!!) eax=00000001 ebx=00000000 ecx=00000005 edx=000001e9 esi=0119f36f edi=00000000 eip=645046b1 esp=0119f0b8 ebp=0119f0d0 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000202 MSVCR120!_invoke_watson+0xe: 645046b1 cd29 int 29h -------------------------------------------------------------------------------- Vendor SOUND4 Ltd. - https://www.sound4.com | https://www.sound4.biz Affected Version 1.1.2 Tested On Microsoft Windows 10 Home Vendor Status [26.09.2022] Vulnerability discovered. [30.09.2022] Vendor contacted. [07.02.2023] No response from the vendor. [08.02.2023] Public security advisory released. PoC sound4_fmt_linkandshare.txt Credits Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk> References N/A Changelog [08.02.2023] - Initial release Contact Zero Science Lab Web: https://www.zeroscience.mk e-mail: lab@zeroscience.mk Source
    1 point
  6. Meh, noua ne place sa futem
    1 point
×
×
  • Create New...