Fortinet Sandbox Flaws Allow Attackers to Bypass Authentication, Execute Commands

Two critical flaws in Fortinet's sandbox could let attackers skip login and run malicious commands, putting your system at risk - so don't wait, patch now! A recent report urges administrators to act fast, as these vulnerabilities could be exploited by unauthenticated attackers over HTTP.

https://osintsights.com/fortinet-sandbox-flaws-allow-attackers-to-bypass-authentication-execute-commands?utm_source=mastodon&utm_medium=social

#Fortinet #SandboxVulnerabilities #AuthenticationBypass #RemoteCodeExecution #EmergingThreats

Fortinet Sandbox Flaws Allow Attackers to Bypass Authentication, Execute Commands

Patch Fortinet sandbox flaws now to prevent attackers from bypassing authentication and executing commands, protect your systems from unauthorized access today.

OSINTSights

nginx-ui Flaw Enables Full Server Takeover via Active Exploits

A single flaw in nginx-ui, a popular open-source management tool for Nginx, has been actively exploited, allowing attackers to seize control of your server with ease. This critical authentication bypass vulnerability, tracked as CVE-2026-33032, has been rated extremely severe with a CVSS score of 9.8.

https://osintsights.com/nginx-ui-flaw-enables-full-server-takeover-via-active-exploits?utm_source=mastodon&utm_medium=social

#Nginxui #Cve202633032 #AuthenticationBypass #ServerTakeover #EmergingThreats

nginx-ui Flaw Enables Full Server Takeover via Active Exploits

nginx-ui flaw enables server takeover via active exploits, learn how to protect your Nginx service now and prevent devastating attacks today.

OSINTSights

Nginx-ui Flaw Exploited in Active Attacks Worldwide

A critical flaw in the nginx-ui MCP component, tracked as CVE-2026-33032, is being actively exploited worldwide, allowing attackers to bypass authentication and slip past one of the most basic protections. This highly severe vulnerability, rated 9.8 on the CVSS scale, poses an immediate dilemma for organizations that depend on…

https://osintsights.com/nginx-ui-flaw-exploited-in-active-attacks-worldwide?utm_source=mastodon&utm_medium=social

#Cve202633032 #Nginxui #AuthenticationBypass #EmergingThreats #VulnerabilityExploitation

Nginx-ui Flaw Exploited in Active Attacks Worldwide

Nginx-ui flaw CVE-2026-33032 exploited worldwide, posing critical threat. Learn how to protect your organization now from active attacks.

OSINTSights

Biometric Authentication Fortifies Against Stolen Credential Attacks

In a world where stolen credentials can turn authentication systems against us, traditional multifactor authentication can become just another vulnerability to exploit. Biometric authentication offers a powerful solution, fortifying defenses against stolen credential attacks by making it…

https://osintsights.com/biometric-authentication-fortifies-against-stolen-credential-attacks?utm_source=mastodon&utm_medium=social

#BiometricAuthentication #MultifactorAuthentication #StolenCredentials #AuthenticationBypass #EmergingThreats

Biometric Authentication Fortifies Against Stolen Credential Attacks

Boost your security with biometric authentication, fortifying against stolen credential attacks and protecting your network - learn how to secure your defenses now effectively.

OSINTSights

Understanding OTP Verification Bypass via Client-Side Response Manipulation
This article describes an authentication bypass vulnerability caused by insufficient input validation and inadequate server-side response checking on the client side. The application accepted user-supplied One-Time Password (OTP) values without verifying their format or source, allowing attackers to manipulate the OTP response. By injecting a custom JavaScript payload containing `document.cookie = 'session_id=attacker; path=/'`, the researcher was able to set a persistent session cookie on the victim's browser after successfully submitting an invalid OTP. This manipulated response was accepted by the application, leading to unauthorized account access. The vulnerability paid out $500, and the organization addressed it by implementing strong input validation and server-side response verification on client-side scripts—never trust user-controlled data for security decisions. Key lesson: Validate inputs and verify responses at both client-side and server-side to prevent authentication bypass. #BugBounty #AuthenticationBypass #WebSecurity #Infosec

https://medium.com/@kemzx/understanding-otp-verification-bypass-via-client-side-response-manipulation-a6d2960c95aa?source=rss------bug_bounty-5

Understanding OTP Verification Bypass via Client-Side Response Manipulation

اللهم صل وسلم وبارك على نبينا محمد 🔻اللهم انصر إخواننا المستضعفين في كل مكان

Medium

How a $32,500 Bug Let Anyone Take Over Your Instagram — A Review of Youssef Sammouda's Meta Pixel Vulnerability
This article discusses an authentication bypass vulnerability in Instagram due to improper validation of the Facebook Pixel ID. The researcher, Youssef Sammouda, discovered that Instagram accepted any pixel ID for both user account creation and login when passing it through a custom Facebook Pixel URL parameter (fbclid). By exploiting this flaw, an attacker could create a new account with admin privileges using another user's pixel ID. The root cause was the failure to verify if the provided pixel ID matched the associated Instagram account or check for authorized access. This vulnerability allowed unauthorized creation of admin accounts and potential access to sensitive data. The researcher received $32,500 as a reward for reporting this critical bug. To prevent similar issues, Instagram should validate Facebook Pixel IDs against legitimate account associations and enforce proper access control mechanisms. Key lesson: Strictly enforce user-provided ID validation and authorization checks to avoid authentication bypass vulnerabilities. #BugBounty #AuthenticationBypass #WebSecurity #SocialMediaSecurity #Infosec

https://medium.com/@vivekps143/how-a-32-500-bug-let-anyone-take-over-your-instagram-a-review-of-youssef-sammoudas-meta-pixel-cc4b6295456a?source=rss------bug_bounty-5

How a $32,500 Bug Let Anyone Take Over Your Instagram — A Review of Youssef Sammouda’s Meta Pixel…

Note: This article is a review and narrative analysis of a bug bounty write-up published by security researcher Youssef Sammouda (sam0)…

Medium

Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it. #BugBounty #Cybersecurity #AuthenticationBypass #SessionHijacking #Infosec

https://infosecwriteups.com/microsoft-authenticators-unclaimed-deep-link-a-full-account-takeover-story-cve-2026-26123-e0409a920a02?source=rss------bug_bounty-5

Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)

When your authentication app becomes the weakest link: How an unclaimed deep link exposed millions of Microsoft accounts

Medium

Type Juggling 0==Admin Grants 847 Users ADMIN ACCESS?!

TYPE JUGGLING DISASTER! 0=='admin' returns TRUE! Password check BYPASSED! 847 users got admin access! Downloaded 2.3M customer records! $12.3M data breach lawsuit! CTO FIRED!

#php #phpdisaster #typejuggling #authenticationbypass #securitybreach #adminaccess #productionbug #phpshorts #phpwtf #0equalsadmin #careerending #databreach

https://www.youtube.com/watch?v=uh7YHqXPfVo

Type Juggling 0Admin Grants 847 Users ADMIN ACCESS?! #databreach

YouTube

Decorator Order Executes Route BEFORE Auth Check?!

DECORATOR DISASTER! Apply bottom-to-top! Route runs BEFORE auth! Non-admin deletes 847 users! Cannot recover! $4.7M data loss! €2.7M GDPR fine! Security team FIRED!

#python #pythondisaster #decoratororder #authenticationbypass #routesecurity #productionbug #pythonshorts #pythonwtf #adminaccess #careerending #gdpr #flask

https://www.youtube.com/watch?v=8hBZoqogJP0

Decorator Order Executes Route BEFORE Auth Check?! #Flask

YouTube

LM Challenge-Response Hash Always Sent in SMB Authentication
This vulnerability is an Authentication Bypass due to the consistent transmission of LM Challenge-Response hash during SMB authentication. The application failed to disable the LM hash in favor of the more secure NTLM hash, allowing attackers to perform offline attacks against weak LM hashes. The researcher discovered this by observing the network traffic during SMB authentication and identifying the presence of LM hashes, which should have been deprecated. The LM hash is susceptible to dictionary attacks, allowing attackers to crack passwords offline. The system's flawed configuration resulted in the consistent transmission of LM hashes, making it easier for attackers to perform offline attacks. This vulnerability could lead to account takeovers, unauthorized access, and data breaches. The researcher received $5,000 for this discovery. To prevent similar issues, it is crucial to disable the LM hash and ensure that only NTLM hashes are transmitted during SMB authentication. Key lesson: Always use stronger authentication mechanisms like NTLM over deprecated LM hashes. #BugBounty #Cybersecurity #WebSecurity #AuthenticationBypass #SMB

https://hackerone.com/reports/3584491

curl disclosed on HackerOne: LM Challenge-Response Hash Always Sent...

# LM Challenge-Response Hash Always Sent in SMB Authentication ## Summary The curl SMB client unconditionally computes and sends both the legacy LAN Manager (LM) and NT challenge-response hashes during SMB session setup. The LM hash is cryptographically broken — it splits the password into two 7-character halves, converts to uppercase, and uses DES with a fixed constant. Combined with the...

HackerOne