CVE-2023-3128 (🚨 CVSS:9.4) - Authentication Bypass in Grafana

This leads to account takeover & authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

( 📸 Picture credits: Netlas⁠.⁠io

grafana.com/security/security-

While collecting the evidence in 2023 we (Marco Lux & Pedro Umbelino) recognized the ESXi attack by a random group. We decided it is time to publish our results which cumulated in CVE-2023-29552 ( via John Kristoff )

Interestingly, search engines like @shodan, still missing SLP in their collection, which is a pity.

curesec.com/blog/article/CVE-2

Microsoft has addressed an authorization misconfiguration for multi-tenant applications that use Azure AD, initially discovered by Hillai Ben-Sasson, a security researcher at Wiz (wiz.io)



wiz.io/blog/azure-active-direc

  • (PoC) CVE-2023-23397

An attacker is able to force a victim to make a connection to its server without manipulation from the user (zero click vulnerability). An attacker exploiting this vulnerability retrieves a NetNTLMv2 digest based on the password of the trapped user through an SMB request

github.com/Trackflaw/CVE-2023-

This paper describes a vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms

eprint.iacr.org/2023/331.pdf

🐛 Can you spot the vulnerability? Identifieras-tu la vulnérabilité ?

Credits: ACCEIS (acceis.fr)

This framework describes how a natural or legal person with no fraudulent intent or intention to cause harm can detect and must report existing vulnerabilities in networks and information systems in 🇧🇪 Belgium

ccb.belgium.be/en/news/new-leg

ccb.belgium.be/en/vulnerabilit

🚨 CVE-2022-27518

A vulnerability has been discovered in Citrix Gateway and Citrix ADC, listed below, that, if exploited, could allow an unauthenticated Remote attacker to perform arbitrary Code Execution on the appliance

support.citrix.com/article/CTX

Plus anciens