If you ever wanted an Remote Code Execution exploit for Palo-Alto GlobalProtect (VPN solution presented to internet by design), somebody made one which spawns a webshell, used it to hack Uber.http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html …
-
-
Serious question: when a vendor finds a potential vuln internally (e.g., this format string issue), doesn't it make sense for them to just remove it without even investing in exploitation assessment (which could be costly)?
-
So it remains a Schroedinger's vuln without a CVE, and if a fixed version is provided and customers advised to update to it "for security reasons", with possibly an auto-update available, isn't that kinda okay? (Not saying this is what happened here btw.)
- 6 more replies
New conversation -
-
-
What about the workflows of "no logo/media coverage" = "no vulnerability"
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.