![Horizon3 Attack Team Profile](https://pbs.twimg.com/profile_images/1468939182055862279/F76_PFKN_x96.jpg)
Horizon3 Attack Team
@Horizon3Attack
Followers
10K
Following
58
Statuses
96
@Horizon3ai Attack Team | Security Research | Exploit Dev | TTPs
Joined December 2021
We disclosed a few vulns last week affecting SimpleHelp's remote support software: ♦️ CVE-2024-57726: Priv esc to admin ♦️ CVE-2024-57727: Unauth arbitrary file download ♦️ CVE-2024-57728: Admin RCE via arbitrary file upload Together these vulns could enable an attacker with no prior privileges to compromise a SimpleHelp server and client machines managed by SimpleHelp. Our blog with a detection POC:
1
25
90
Our latest post detailing compromising the #PaloAlto #Expedition. While investigating CVE-2024-5910, we discovered and reported 3 additional vulnerabilities allowing an attacker to obtain RCE and leak integration credentials across the ecosystem.
6
118
239
Today, we are disclosing the details of CVE-2024-28987, a hardcoded cred vuln affecting #SolarWinds Web Help Desk. It allows attackers to read all help desk tickets, often containing sensitive IT procedures: 🔹User onboarding 🔹Password resets 🔹Shared resource creds
1
36
99
CVE-2024-29847, affecting #Ivanti EPM, allows remote unauthenticated attackers to execute arbitrary commands as SYSTEM. Check out our latest deep-dive: Credit to @SinSinology for the initial discovery.
2
46
121
Additionally, we disclosed a critical path traversal vulnerability CVE-2024-31214 affecting the popular #Traccar GPS tracking application, that could lead to unauthenticated remote code execution in the default configuration of Traccar 5.
0
6
15
In light of a recent potential breach affecting #HuggingFace, here are a few vulnerabilities we disclosed that affected #Gradio and our recent work with Hugging Face to secure their Spaces environment: 🔺 CVE-2023-51449 🔺 CVE-2023-1561
2
33
56
Our deep-dive for the recent #Ivanti Endpoint Manager (EPM) unauth SQL injection to RCE vulnerability: CVE-2024-29824.
1
58
130
Our latest post by one of our recent team additions, Luke Harding, revisits CVE-2023-48788 - a SQL injection for #Fortinet #FortiClient EMS. He details exploitation obstacles and payload crafting between the two mainline versions of the software.
0
58
115
Back again - more cmd injections for the #Fortinet #FortiSIEM! Today we’re disclosing the details surrounding CVE-2024-23108 and CVE-2024-23109. These result from the use of Python’s os.system() in scripts which an unauth attacker controls arguments.
3
79
149
Our deep-dive, IOCs, and exploit for CVE-2023-34992, an unauth command injection as root, effecting #Fortinet #FortiSIEM appliances.
0
109
209
Our deep-dive for the recent #Fortinet #FortiClient EMS SQL injection vulnerability, CVE-2023-48788, that leads to RCE as SYSTEM.
8
100
236
The recent #Fortinet #FortiClient Endpoint Management Server (EMS) SQL injection vulnerability, CVE-2023-48788, allows an unauth attacker to obtain RCE as SYSTEM on the server. IOCs, POC, and deep-dive blog to be released next week. In the meantime, check DAS service logs for malicious looking queries.
0
108
221