ColdFusion Local File Read (CVE-2024-20767)

  Рет қаралды 5,352

NahamSec

NahamSec

Күн бұрын

📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:
www.buymeacoff...
JOIN DISCORD:
discordapp.com...
🆓 🆓 🆓 $200 DigitalOcean Credit:
m.do.co/c/3236...
💬 Social Media
- / nahamsec
- / nahamsec
- twitch.com/nah...
- / nahamsec1
#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

Пікірлер: 15
@khanabdulmuhammad5625
@khanabdulmuhammad5625 6 ай бұрын
00:03 New ColdFusion vulnerability announced with bug bounty program implications. 01:04 ColdFusion Local File Read vulnerability on MacBook 01:55 UUID is essential for sending requests 02:50 CFC provides uu ID to access ETC password file on server 03:42 Identifying and accessing vulnerable CloudFusion instances 04:38 Identifying and exploiting vulnerabilities in ColdFusion server. 05:28 Using curl to make a request to local host 8500 and analyzing the headers 06:19 Update to prevent exploitation of ColdFusion vulnerability
@SamuelHernandez-i1b
@SamuelHernandez-i1b 16 күн бұрын
Jackson Linda Rodriguez Margaret Johnson Sharon
@brs2379
@brs2379 6 ай бұрын
More CVE videos please 🙏
@johnyanderson4542
@johnyanderson4542 6 ай бұрын
Upvote
@theskelet4r
@theskelet4r 6 ай бұрын
Encase you were looking for the referenced DC26 talk: Orange Tsai - Breaking Parser Logic - kzbin.info/www/bejne/aGnbiJaImsyhmdk
@ВиталийОвчаренко-и1н
@ВиталийОвчаренко-и1н 5 ай бұрын
The stages involved in resolving issues related to CVE-2024-20767 would typically include: 1. Discovery: The vulnerability is identified, either by a reporter or through internal testing. 2. Reporting: The reporter contacts the CVE Assignment Team or a CNA to request a CVE ID for CVE-2024-20767. 3. Evaluation: The vulnerability is evaluated to determine its severity and impact. 4. Assignment: A CVE ID is assigned to CVE-2024-20767 by the CVE Assignment Team or a CNA. 5. Documentation: The vulnerability details are documented in the MITRE glossary and analyzed by NIST. 6. Publication: The vulnerability information is listed in NIST's National Vulnerability Database (NVD) for public access. 7. Mitigation: Once the vulnerability is public, vendors and organizations work on providing patches or mitigations to address CVE-2024-20767. These stages ensure that the vulnerability is properly identified, documented, and addressed to enhance cybersecurity.
@Debiure
@Debiure 6 ай бұрын
Omg 😯
@ВиталийОвчаренко-и1н
@ВиталийОвчаренко-и1н 6 ай бұрын
To reinstall and renew security for CVE-2024-20767, you should ensure that you have the latest security updates installed for the affected software. Check the Microsoft Security Update Guide for specific details on addressing this CVE. It is recommended to regularly update your software to mitigate vulnerabilities and enhance security.
@MarkFoudy
@MarkFoudy 6 ай бұрын
second!
@MrAarsan
@MrAarsan 6 ай бұрын
Yooo 🎉
@Budokid
@Budokid 6 ай бұрын
Why does the uuid header bypass the 403? I’ve not heard of an application using uuid headers for authorization before
@mango-gu5xo
@mango-gu5xo 6 ай бұрын
I want to transition from a traditional office environment to a freelance security professional role. Could you give me a couple of advices? thank you.
@mango-gu5xo
@mango-gu5xo 6 ай бұрын
Hello, Are you full time bug bounty ?
@MarkFoudy
@MarkFoudy 6 ай бұрын
Thanks Nahmsec. Are you doing any content from this year's HackSpaceCon? I am super pumped for the conference!
How to Look For Virtual Hosts // How To Bug Bounty
12:53
NahamSec
Рет қаралды 15 М.
Don't Make This Recon Mistake // How To Bug Bounty
10:09
NahamSec
Рет қаралды 18 М.
LIFEHACK😳 Rate our backpacks 1-10 😜🔥🎒
00:13
Diana Belitskay
Рет қаралды 3,9 МЛН
Will A Guitar Boat Hold My Weight?
00:20
MrBeast
Рет қаралды 257 МЛН
Why I don't change SSH from port 22
13:31
Dreams of Code
Рет қаралды 23 М.
Hide your files like a hacker (5 Ways)
19:17
NetworkChuck
Рет қаралды 139 М.
5 Techniques that you didn't know about Amass
6:01
LeetDoor
Рет қаралды 1,4 М.
What are you going to do in 2023? Tops 5 skills to get!
18:56
David Bombal
Рет қаралды 2,4 МЛН
The Truth About Bug Bounties
11:31
NahamSec
Рет қаралды 37 М.
Bug Bounty Target Deep Dive
10:52
NahamSec
Рет қаралды 14 М.
2024 Guide: Hacking APIs
20:21
NahamSec
Рет қаралды 19 М.
LIFEHACK😳 Rate our backpacks 1-10 😜🔥🎒
00:13
Diana Belitskay
Рет қаралды 3,9 МЛН