GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Caitlin Condon (catc0n@infosec.exchange)

  1. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Thursday, 08-May-2025 06:00:59 JST Caitlin Condon Caitlin Condon
    • Ryan Emmons

    Today, @fuzz disclosed 3 new vulnerabilities in SonicWall SMA-100 series appliances, one of which we believe may have been used in the wild. We're grateful to SonicWall's PSIRT team for a smooth and exceptionally quick response!

    An attacker with access to an SMA SSLVPN user account can chain these 3 vulnerabilities to make a sensitive system directory writable, elevate their privileges to SMA administrator, and write an executable file to a system directory. This chain results in root-level remote code execution. The vulnerabilities have been fixed in the latest version.

    https://www.rapid7.com/blog/post/2025/05/07/multiple-vulnerabilities-in-sonicwall-sma-100-series-2025/

    In conversation about a day ago from infosec.exchange permalink
  2. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Saturday, 12-Apr-2025 08:15:37 JST Caitlin Condon Caitlin Condon
    • Kevin Beaumont
    • Ryan Emmons

    @GossiTheDog @fuzz yeah! Part of me dislikes that we're spending so much time on debunking (rather than, like...bunking?) vuln hype recently, but the practitioner side sounded pretty concerned about this and it's nice to be able to say honestly there's no need to panic. Thanks @fuzz :)

    In conversation about a month ago from infosec.exchange permalink
  3. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Saturday, 12-Apr-2025 08:11:07 JST Caitlin Condon Caitlin Condon
    • Ryan Emmons

    Really thoughtful write-up on Apache Parquet CVE-2025-30065 by @fuzz:

    "Overall, this feels like a clever red team exploit, where attackers have some existing authenticated write access to a bucket, knowledge of the underlying tech stack, and the desire to perform fancy lateral movement to achieve a niche goal in a hardened environment....As it stands, though this is cool, it requires a lot of expertise and time to weaponize, and RCE isn’t a sure thing even if you do get a Parquet file deserialized by a vulnerable instance."

    https://attackerkb.com/assessments/3c043281-25a1-44fc-a361-00e02ec2bc60

    In conversation about a month ago from infosec.exchange permalink

    Attachments


  4. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Friday, 11-Apr-2025 04:25:10 JST Caitlin Condon Caitlin Condon
    • Stephen Fewer

    Full analysis of Ivanti Connect Secure CVE-2025-22457 via @stephenfewer — full RCE, exploitation non-trivial (at least as it stands now).

    We should all be assuming that for any popular or high-profile technology, particularly network edge devices, adversaries have piles of software they're actively reverse engineering and developing complex exploit chains for, regardless of whether vulnerabilities are disclosed publicly as security issues or not. TAs are putting time, resources, and focus into learning the internals of *many* of these systems. If the technology industry broadly — and we ALL live in glass houses here — can't match that investment with expertise and evolution, I'm not sure we can expect the current attack landscape to improve.

    https://attackerkb.com/topics/0ybGQIkHzR/cve-2025-22457/rapid7-analysis

    In conversation about a month ago from infosec.exchange permalink

    Attachments


  5. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Thursday, 20-Mar-2025 08:16:56 JST Caitlin Condon Caitlin Condon
    • Ryan Emmons

    Okay, so Tomcat's a bust, but this sucker (CVE-2025-23120) could get interesting if the technical reality matches the advisory severity.

    It still throws me how many incidents Rapid7 MDR sees that include abuse of Veeam Backup & Replication in some manner — the deployment footprint of this product is always surprising to me, maybe because it's not usually internet-exposed, dunno. Anywho, domain-joined backup servers might be "against best practices," but that doesn't mean it's uncommon 🤷♀️ Thx to @fuzz for being on top of it as usual!

    https://www.rapid7.com/blog/post/2025/03/19/etr-critical-veeam-backup-and-replication-cve-2025-23120/

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blog.rapid7.com
      Critical Veeam Backup & Replication CVE-2025-23120 | Rapid7 Blog
  6. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Thursday, 20-Mar-2025 00:05:23 JST Caitlin Condon Caitlin Condon

    Has anyone actually confirmed real-world compromises from the supposed Apache Tomcat exploitation (CVE-2025-24813) going on? Breathless headlines seem to be quoting a single vague source, and this bug isn't exploitable in anywhere close to a default config https://attackerkb.com/assessments/1a24556d-24fb-4017-be67-e4ab39c76566

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: attackerkb.com
      CVE-2025-24813 | AttackerKB
      Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files vi…
  7. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Friday, 14-Feb-2025 00:33:46 JST Caitlin Condon Caitlin Condon
    • Stephen Fewer

    New #Rapid7 vuln disclosure c/o
    @stephenfewer: CVE-2025-1094 is a SQL injection flaw in PostgreSQL's psql interactive tool that was discovered while analyzing BeyondTrust RS CVE-2024-12356. The bug is interesting — 🧵on its relation to BeyondTrust exploitation https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blog.rapid7.com
      CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
  8. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Tuesday, 07-Jan-2025 23:52:42 JST Caitlin Condon Caitlin Condon

    I'm #hiring a vulnerability research manager in #Dublin, IE to manage zero-day research and coordinated vuln disclosure and to manage a small team of exceptionally skilled and kind folks. Hybrid role for now, Reading UK and Prague CZ also possible in addition to Dublin! https://careers.rapid7.com/jobs/manager-vulnerability-research-dublin-ireland

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: d25wby5c7p9100.cloudfront.net
      Manager, Vulnerability Research - Dublin, Ireland
      Job OverviewRapid7’s security sciences division is looking for an experienced vulnerability research leader to help define and execute a research strategy that helps defenders get ahead of the curve, drives product and services innovation, and keeps Rapid7 top of mind for industry audiences. In addition to directly managing a small team of talented researchers, you’ll work with a skilled group of offensive security experts to define long-term priorities, evolve strategy where needed, and emphasize the importance of research to executive-level stakeholders.  About the TeamRapid7's vulnerability and exploit research team does industry-leading attack research that prioritizes and uncovers risk for organizations worldwide....
  9. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Tuesday, 24-Dec-2024 04:47:50 JST Caitlin Condon Caitlin Condon

    Pre-Christmas 0day just dropped, video PoC here: https://m.youtube.com/watch?v=E8gmARGvPlI

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments

    1. Wham! - Last Christmas (Official Video)
      from WhamVEVO
      Wham! - Last Christmas (Official Video)WHAM! The Singles: Echoes From The Edge Of Heaven: https://wham.lnk.to/TheSinglesStream and download here: https://Wha...
  10. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Thursday, 19-Dec-2024 05:47:42 JST Caitlin Condon Caitlin Condon
    • Ryan Emmons

    Almost exactly a year ago, Rapid7 put out a technical analysis of Apache #Struts 2 CVE-2023-50164 that said:

    * Exploit payloads were going to need to be customized to the target

    * It wasn't clear that there was any critical mass of remotely exploitable applications out of the box

    * The reports of exploitation in the wild all appeared to be unsuccessful attempts rather than IRL compromises of production systems.

    https://attackerkb.com/topics/pe3CCtOE81/cve-2023-50164/rapid7-analysis

    Fast-forward to CVE-2024-53677 and we can repeat the above verbatim, with one pretty notable exception — the "fixed" version that ostensibly remediates the vulnerability actually doesn't, and code-level changes are required (to migrate away from the vulnerable file upload interceptor) to actually remediate it. Also the "fixed" release (6.4.0) appears to have gone out a year ago? No idea. Big ups to @fuzz for the analysis!

    https://attackerkb.com/assessments/28f08c0a-702c-4ab0-99cb-eea00202fa2c

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments



  11. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Monday, 16-Dec-2024 23:57:30 JST Caitlin Condon Caitlin Condon
    • Stephen Fewer

    Full Rapid7 analysis of #Cleo CVE-2024-55956 now available c/o @stephenfewer. It's neither a patch bypass of CVE-2024-50623 nor part of a chain after all — totally new bug, different exploitation strategies across the two issues (though the same endpoint gets used either way).

    I'm not sure it's been mentioned much yet that Cleo evidently released IOCs related to CVE-2024-50623 in October 2024, implying the older bug's been exploited for a minute. Would sure be helpful to know more about who was doing that exploiting, particularly now that Cl0p has claimed credit for last week's attack.

    https://attackerkb.com/topics/geR0H8dgrE/cve-2024-55956/rapid7-analysis

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments


  12. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Friday, 15-Nov-2024 22:24:30 JST Caitlin Condon Caitlin Condon

    Unpatched 0day in an enterprise firewall management interface? Must be Friday :batman: https://www.rapid7.com/blog/post/2024/11/15/etr-zero-day-exploitation-targeting-palo-alto-networks-firewall-management-interfaces/

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blog.rapid7.com
      Zero-day exploitation targeting Palo Alto Networks firewall management interfaces | Rapid7 Blog
  13. Embed this notice
    Caitlin Condon (catc0n@infosec.exchange)'s status on Monday, 22-Jan-2024 02:28:44 JST Caitlin Condon Caitlin Condon

    This is exceptional: https://ciaranmartin.substack.com/p/on-the-matter-of-the-british-library

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: substackcdn.com
      On the matter of the British Library cyber incident
      from Ciaran Martin
      The most important lesson to figure out is why it is taking so long to restore services. That will tell us how to prevent such a calamity in other vital national institutions.

User actions

    Caitlin Condon

    Caitlin Condon

    Adventurer. Takes a lot of photos, calls many places home. Vulnerability research director @ Rapid7. Opinions mine, etc. She/her.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          237167
          Member since
          21 Jan 2024
          Notices
          13
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.