www.coresecurity.com
Open in
urlscan Pro
2606:4700::6812:bcc
Public Scan
Submitted URL: https://t.co/GSYBck5w1O
Effective URL: https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-june-2024
Submission: On November 26 via api from IN — Scanned from DE
Effective URL: https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-june-2024
Submission: On November 26 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Cookie-Präferenzen Skip to main content * Fortra.com * Contact Us * Support * All Fortra Products * FREE TRIALS * Fortra.com * Contact Us * Support * All Fortra Products * FREE TRIALS * Cyber Threat Toggle Dropdown PRODUCTS * Core Impact Penetration testing software * Cobalt Strike Red team software * Outflank Security Tooling (OST) Evasive attack simulation * Event Manager Security information and event management * Powertech Antivirus Server-level virus protection * Product Bundles Layered security solutions SOLUTIONS * Penetration Testing * Penetration Testing Services * Offensive Security * Threat Detection * Security Information and Event Management * Penetration Testing Services Security consulting services * Identity Toggle Dropdown PRODUCTS * Access Assurance Suite User provisioning and governance * Core Password & Secure Reset Self-service password management * Core Privileged Access Manager (BoKS) Privileged access management (PAM) SOLUTIONS * Privileged Access Management * Identity Governance & Administration * Password Management * See How to Simplify Access in Your Organization | Request a Demo * Industries Toggle Dropdown * Healthcare * Financial Services * Federal Government * Retail * Utilities & Energy * Higher Education * Compliance * Resources Toggle Dropdown * Upcoming Webinars & Events * Blogs * Case Studies * Videos * Datasheets * Guides * Training * Compliance * All Resources * CoreLabs Toggle Dropdown * Advisories * Exploits * Articles * Impacket * About Toggle Dropdown * Partners * Careers * Newsroom * Contact Us 1. Home 2. Blog 3. Core Impact Monthly Chronicle: Exploits and Updates | June 2024 CORE IMPACT MONTHLY CHRONICLE: EXPLOITS AND UPDATES | JUNE 2024 CORE IMPACT EXPLOIT LIBRARY ADDITIONS One of Core Impact’s most valuable features is its certified exploit library. Fortra’s Core Security has a team of expert exploit writers that conduct research, evaluating and prioritizing the most relevant vulnerabilities in order to update the library with critical and useful exploits. Additionally, the QA team creates its own clean environment to validate each exploit before its release to ensure our standards and validate that it is safe and ready to use. While you can keep track of new releases through our exploit mailing list, here is a more detailed summary of some of the most recent additions to the library. CVE-2024-24919 - CHECK POINT SECURITY GATEWAY TRAVERSAL EXPLOIT Authors: Marcos Accossatto and Daniel De Luca (QA) CVSS: 8.6 HIGH Reference: CVE-2024-24919 A directory traversal vulnerability was found in Check Point’s Network Security gateway products, including CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances. If exploited, attackers can extract system files from these gateways. This vulnerability was a ZeroDay flaw that has been exploited by attackers since April. Users are urged to patch this vulnerability as soon as possible by implementing the available Hotfix. With this exploit, a pen tester could simulate an unauthenticated attacker and access and download sensitive data, including password hashes for local accounts. These hashes could then be cracked and used to potentially elevate privileges. CVE-2023-36003 - MICROSOFT WINDOWS INITIALIZEXAMLDIAGNOSTICSEX LOCAL PRIVILEGE ESCALATION EXPLOIT CVSS: 7.3 HIGH Reference: CVE-2023-36003 A vulnerability was discovered in the XAML Diagnostics API in Windows, which is designed to inspect XAML applications. If exploited, an authorized attacker with regular user privileges may be able to inject a malicious file and then convince a user to execute a UWP application. This exploit enables a pen tester to imitate an authorized attacker and potentially gain full SYSTEM privileges. CVE-2024-27348 - APACHE HUGEGRAPH GREMLIN SCRIPT REMOTE CODE EXECUTION EXPLOIT Authors: Marcos Accossatto, Luis García Sierra (QA) and Daniel De Luca (QA) CVSS: 9.8 CRITICAL Reference: CVE-2024-27348 A critical vulnerability was discovered in Apache HugeGraph, an open-source graph database. If exploited, attackers could achieve remote code execution using the graph traversal language, Gremlin, to bypass sandbox restrictions. Given the criticality of this vulnerability and the public availability of exploit code, users are urged to upgrade to version 1.3 as soon as possible. Pen testers can use this exploit to imitate a remote attacker, potentially extracting sensitive data or gaining full control of the server. CVE-2024-4577 - PHP CGI ARGUMENT INJECTION VULNERABILITY REMOTE CODE EXECUTION EXPLOIT Authors: Marcos Accossatto and Luis García Sierra (QA) CVSS: 9.8 CRITICAL Reference: CVE-2024-4577 A critical vulnerability was discovered in PHP when used with Apache and PHI-CGI on Windows systems configured to use certain code features. If exploited, attackers can use an argument injection to execute arbitrary code. Attempts have already been made to exploit this vulnerability in the wild. Additionally, as this vulnerability impacts every version of PHP on Windows, users are urged to implement the fix as soon as possible. With this exploit, pen testers can imitate a remote attacker and pass options to PHP binary being run, eventually executing system commands in the context of the affected application. CVE-2018-2628 - ORACLE WEBLOGIC SERVER WLS REMOTE CODE EXECUTION EXPLOIT—UPDATE Authors: Fernando Páez Barceló and Daniel De Luca (QA) CVSS: 9.8 CRITICAL Reference: CVE-2018-2628 A vulnerability was found in the server component of Oracle Fusion Middleware, a platform that enables the development, deployment, and management of enterprise applications, primary in cloud environments. When exploited, an attacker could potentially take control of an Oracle WebLogic Server. This exploit enables a pen tester to simulate an unauthenticated attacker with network access through the T3 protocol could send a serialized object to execute code on vulnerable hosts, eventually obtaining full privileges for the entire target system. Originally released in December 2023, this exploit has been updated to fix an issue that occurred when used in a pivoted context. CVE-2024-21887 & CVE-2023-46805 - IVANTI CONNECT SECURE UNAUTHENTICATED REMOTE CODE EXECUTION EXPLOITS Authors: Fernando Páez Barceló and Nahuel Gonzalez (QA) CVSS: 9.1 CRITICAL & 8.2 CRITICAL Reference: CVE-2024-21887 and CVE-2023-46805 This module exploits two vulnerabilities. First, it uses CVE-2023-46805, which is an authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure. When exploited, it allows the execution of commands and control check bypass, leveraging the lack of authentication in "/api/v1/totp/user-backup-code" and allowing unauthenticated access and path traversal. Then, the module uses the command injection CVE-2024-21887 vulnerability to execute remote commands in "/api/v1/license/key-status/path:node_name" The exploit allows testers to deploy a Core Impact agent to gain full access into the compromised machine. Attackers have actively exploited these vulnerabilities in the wild, including a recent incident in which the Mirai botnet was deployed. They have been added CISA’s Known Exploited Vulnerabilities Catalog and CISA has also released a joint advisory to consider the significant risks of continuing to operate these devices. Users are urged to patch this vulnerability as soon as possible. Using this exploit, pen testers can imitate an attacker, enabling them to gain a foothold and potentially fully compromise an internal enterprise network. CVE-2024-26229 - MICROSOFT WINDOWS CSC SERVICE PRIVILEGE ESCALATION EXPLOIT Authors: Cristian Rubio and Arthur Lallemant (QA) CVSS: 7.8 HIGH Reference: CVE-2024-26229 A privilege escalation vulnerability was discovered in the Client Side Caching Driver (csc.sys) in Microsoft Windows. Since the driver Is vulnerable to a memory corruption, it is at risk of an arbitrary memory write. If exploited, an attacker with limited credentials could escalate privileges and potentially execute arbitrary code. With this exploit, pen testers can simulate a local unprivileged user and allow them to gain SYSTEM privileges, which could lead to unauthorized actions including modifying configurations, deploying malware, or exfiltrating sensitive information. Meet the Author PABLO ZURRO Cybersecurity Product Manager Core Security, by Fortra View Profile Related Products Core Impact Related Content Blog Core Impact Monthly Chronicle: Exploits and Updates | May 2024 Blog Core Impact Monthly Chronicle: Exploits and Updates | April 2024 Blog Core Impact Monthly Chronicle: Exploits and Updates | March 2024 Blog Open Source vs. Enterprise: Why Not All Exploits are Created Equal LEARN MORE ABOUT CORE IMPACT WATCH DEMO * Email Us * X Find us on Twitter * LinkedIn Find us on LinkedIn * Facebook Find us on Facebook * YouTube Find us on YouTube PRODUCTS * Access Assurance Suite * Core Impact * Cobalt Strike * Event Manager * Browse All Products SOLUTIONS * IDENTITY GOVERNANCE * PAM * IGA * IAM * Password Management * Vulnerability Management * Compliance * CYBER THREAT * Penetration Testing * Red Team * Phishing * Threat Detection * SIEM RESOURCES * Upcoming Webinars & Events * Corelabs Research * Blog * Training ABOUT * Our Company * Partners * Careers * Accessibility Also of Interest * Core Impact Monthly Chronicle: Exploits and... * Core Impact Monthly Chronicle: Exploits and... * Core Impact Monthly Chronicle: Exploits and... SUPPORT PRIVACY POLICY CONTACT IMPRESSUM COOKIE POLICY Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.