Apache ActiveMQ RCE Leads to Domain Compromise

Apache ActiveMQ RCE Leads to Domain Compromise

| | attack paths, Blog
Pervasive CISA Known Exploited Vulnerability Enables Initial Access The post Apache ActiveMQ RCE Leads to Domain Compromise appeared first on Horizon3.ai ... Read More
NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208)

NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208)

| | Blog, Disclosures, Red Team
Mirth Connect, by NextGen HealthCare, is an open source data integration platform widely used by healthcare companies. Versions prior to 4.4.1 are vulnerable to an unauthenticated remote code execution vulnerability, CVE-2023-43208. If you’re a user of Mirth Connect, you’ll want to upgrade to the latest patch release, 4.4.1, as of ... Read More
Apache Superset Part II: RCE, Credential Harvesting and More

Apache Superset Part II: RCE, Credential Harvesting and More

| | Blog, Disclosures, Red Team
Apache Superset is a popular open source data exploration and visualization tool. In a previous post, we disclosed a vulnerability, CVE-2023-27524, affecting thousands of Superset servers on the Internet, that enables unauthorized attackers to gain admin access to these servers. We also alluded to methods that an attacker, logged in ... Read More
CVE-2023-39143: PaperCut Path Traversal/File Upload RCE Vulnerability

CVE-2023-39143: PaperCut Path Traversal/File Upload RCE Vulnerability

Summary CVE-2023-39143 is a critical vulnerability we disclosed to PaperCut that affects the widely used PaperCut NG/MF print management software. It affects PaperCut NG/MF running on Windows, prior to version 22.1.3. If you are a user of PaperCut on Windows, and have it exposed to the Internet, we recommend you ... Read More
CVE-2023-27524: Insecure Default Configuration in Apache Superset Leads to Remote Code Execution

CVE-2023-27524: Insecure Default Configuration in Apache Superset Leads to Remote Code Execution

Apache Superset is an open source data visualization and exploration tool. It has over 50K stars on GitHub, and there are more than 3000 instances of it exposed to the Internet. In our research, we found that a substantial portion of these servers – at least 2000 (two-thirds of all ... Read More
Metrics That Matter: An Attacker’s Perspective on Assessing Password Policy

Metrics That Matter: An Attacker’s Perspective on Assessing Password Policy

| | Blog, passwords
After compromising a Windows domain controller, one of the actions that NodeZero, our autonomous pentest product, performs is dumping all domain user password hashes from the Active Directory database. This is a common attacker technique, and the resulting dump is highly valuable to attackers. But did you know that this ... Read More
The Undeniable Effectiveness of Password Spray

The Undeniable Effectiveness of Password Spray

One of the most effective techniques NodeZero employs for initial access is password spray. It’s a primitive technique, basically guessing passwords, and when it works it feels like magic. Yet we see it work time and time again in various pentests conducted by NodeZero. In this post we’ll talk about ... Read More

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)