Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882)

We bet you thought you’d be allowed to sit there, breathe, and savour the few moments of peace you’d earned after a painful week in cyber security. Obviously, you were horribly wrong, and you need to wake up now - we’re back, it’s all on fire,

watchTowr Labs
291: AWS, GCP and Azure eat KRO Are abandoned S3 buckets a problem? watchTowr Labs seems to think so… although Jonathan isn’t convinced. Join us for episode 291, as The Cloud Pod crew turns into a digital Goodwill. #watchTowr #thecloudpod #s3buckets https://www.thecloudpod.net/?p=20998
291: AWS, GCP And Azure Eat KRO

Episode 291 of The Cloud Pod podcast, bringing you all the latest Cloud and AI news from AWS, Oracle, GCP, Azure, OpenAI, DeepSeek, Kro, and Deep Research

The Cloud Pod
291: AWS, GCP and Azure eat KRO Are abandoned S3 buckets a problem? watchTowr Labs seems to think so… although Jonathan isn’t convinced. Join us for episode 291, as The Cloud Pod crew turns into a digital Goodwill. #watchTowr #thecloudpod #s3buckets https://www.thecloudpod.net/?p=20998
291: AWS, GCP And Azure Eat KRO

Episode 291 of The Cloud Pod podcast, bringing you all the latest Cloud and AI news from AWS, Oracle, GCP, Azure, OpenAI, DeepSeek, Kro, and Deep Research

The Cloud Pod
Onderzoek toont risico's van verlaten aws s3-buckets als cyberaanval vector

Recent onderzoek heeft aangetoond dat verlaten AWS S3-buckets een groot risico vormen voor cyberaanvallen. Deze kwetsbaarheid kan gemakkelijk worden uitgebuit

Tech Nieuws

Historia o tym jak badacze bezpieczeństwa mogli przejąć infrastrukturę rządową i nie tylko – cudzymi rękami

O tym, że profesjonaliści zajmujący się bezpieczeństwem powinni z należytą dbałością weryfikować wykorzystywane narzędzia pisaliśmy już nie raz. Ostatnio temat ten został przytoczony omawiając przypadek domeny linpeas.sh. Dzisiaj znów wyciągniemy wnioski z cudzych błędów, a laboratoryjnym przykładem nie będą pentesterzy, a czarne kapelusze (ang. black hat). Jednak morał płynący z...

#WBiegu #Backdoor #Watchtowr #Websec

https://sekurak.pl/historia-o-tym-jak-badacze-bezpieczenstwa-mogli-przejac-infrastrukture-rzadowa-i-nie-tylko-cudzymi-rekami/

Historia o tym jak badacze bezpieczeństwa mogli przejąć infrastrukturę rządową i nie tylko - cudzymi rękami

O tym, że profesjonaliści zajmujący się bezpieczeństwem powinni z należytą dbałością weryfikować wykorzystywane narzędzia pisaliśmy już nie raz. Ostatnio temat ten został przytoczony omawiając przypadek domeny linpeas.sh. Dzisiaj znów wyciągniemy wnioski z cudzych błędów, a laboratoryjnym przykładem nie będą pentesterzy, a czarne kapelusze (ang. black hat). Jednak morał płynący z...

Sekurak

"We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI" -- watchTowr Labs

Quite alarming how little this field seems to have been researched. And bigger registrars are using hardcoded, outdated WHOIS server addresses.. Yikes!

Happy to hear that Let's Encrypt doesn't allow for validation of domains via WHOIS at least. But GlobalSign and others seemingly do..!

https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/

#watchtowr #labs #mobi #whois #rce #vulnerability #infosec #letsencrypt #ca #tls #ssl

We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI

Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries. Summary What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a

watchTowr Labs
Rogue #WHOIS server gives researcher superpowers no one should ever have
.mobi top-level-domain managers changed the location of its WHOIS server. No one got the memo.
It’s not every day that a #security researcher acquires the ability to generate counterfeit HTTPS certificates, track email activity, and execute code of his choice on thousands of servers—all in a single blow that cost only $20 and a few minutes to land.
https://arstechnica.com/security/2024/09/rogue-whois-server-gives-researcher-superpowers-no-one-should-ever-have/ #DNS #watchTowr
Rogue WHOIS server gives researcher superpowers no one should ever have

.mobi top-level-domain managers changed the location of its WHOIS server. No one got the memo.

Ars Technica

A recent security alert highlights a critical vulnerability in PHP that allows attackers to run malicious code on Windows servers. This issue stems from an oversight in PHP's handling of encoding conversions within Windows, specifically affecting servers running PHP in CGI mode. Attackers can exploit this by injecting specific character sequences, leading to arbitrary code execution on remote PHP servers. The vulnerability is particularly concerning due to its simplicity, the ease of exploitation, and the fact that popular platforms like XAMPP are vulnerable by default. Security experts recommend checking PHP servers for susceptibility and applying patches or mitigations promptly to prevent potential attacks.

https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/

#cybersecurity #php #vulnerability #windows #server #cgi #xampp #patch #watchtowr

No Way, PHP Strikes Again! (CVE-2024-4577)

Orange Tsai tweeted a few hours ago about “One of [his] PHP vulnerabilities, which affects XAMPP by default”, and we were curious to say the least. XAMPP is a very popular way for administrators and developers to rapidly deploy Apache, PHP, and a bunch of other tools, and any bug

watchTowr Labs - Blog

[Перевод] CVE-2024-4577: Не может быть, PHP опять под атакой

Orange Tsai недавно запостил про «Одну из уязвимостей PHP, которая влияет на XAMPP, развернутый с настройками по умолчанию», и нам было интересно рассказать немного об этом. XAMPP - очень популярный способ администраторов и разработчиков развернуть Apache, PHP и множество других инструментов, и любая ошибка, которая может быть RCE в установке этого набора по умолчанию, звучит очень заманчиво. Где нашлась очередная уязвимость PHP? Читайте далее.

https://habr.com/ru/articles/820409/

#CVE20244577 #CVE #PHP #phpcgi #xampp #rce #watchtowr #уязвимости #уязвимости_php #уязвимость

CVE-2024-4577: Не может быть, PHP опять под атакой

Orange Tsai недавно запостил про «Одну из уязвимостей PHP, которая влияет на XAMPP, развернутый по умолчанию», и нам было интересно рассказать немного об этом. XAMPP - очень популярный способ...

Хабр

WatchTowr Labs discovered a significant vulnerability, CVE-2024-24919, in Check Point's CloudGuard Network Security appliances. This flaw allows attackers to perform an arbitrary file read operation, specifically targeting the shadow password file, which grants them the ability to read any file on the system if run as a superuser. The researchers demonstrated this by sending a crafted HTTP request to the device, resulting in the return of the shadow password file content. Despite the vendor's claim that the vulnerability only affects devices with username-and-password authentication enabled, the researchers found no clear reason for this limitation based on the code analysis. They also noted the vendor's remediation advice, suggesting placing the vulnerable device behind another hardened device, which they found amusing due to its impracticality.

The discovery process involved analyzing the decompiled code to identify paths that could lead to file traversal and reading operations. The researchers highlighted a particular string table comparison mechanism that, when manipulated, allowed them to specify a directory traversal path in their request. This led to the successful retrieval of the shadow password file, showcasing the potential impact of the vulnerability.

WatchTowr Labs expressed concern over the vendor's downplaying of the severity of the bug, especially since it is already being exploited in the wild. They emphasized the importance of treating this as a full unauthenticated remote code execution (RCE) vulnerability and urged device administrators to update their systems immediately. The vendor, Check Point, has released a hotfix to address the issue, which administrators are advised to apply.

https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/

https://support.checkpoint.com/results/sk/sk182336

#cybersecurity #checkpoint #cloudguard #vulnerability #cve #rce #hotfix #update #watchtowr

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze. Check Point, for those unaware, is the vendor responsible for the 'CloudGuard

watchTowr Labs - Blog