👩‍💻IW Weekly #61: CVE-2023-2822, PII breach, IDOR’s impacting organizations, Open Redirect to Account Takeover, File upload Vulnerabilities, Root an AVD and many more..

👩‍💻IW Weekly #61: CVE-2023-2822, PII breach, IDOR’s impacting organizations, Open Redirect to Account Takeover, File upload Vulnerabilities, Root an AVD and many more..
Photo by Shuvro Mojumder / Unsplash

cyberninja8881 uncovers a reflected cross-site scripting vulnerability lurking in the Ellucian Ethos Identity CAS Logout Page.

Welcome to the #IWWeekly61 - the Monday newsletter that brings the best in Infosec straight to your inbox.

To help you out, we have 5 Articles, 4 Threads, 3 Videos, 2 GitHub Repos and Tools, 1 Job Alert in today’s newsletter.

Read, upskill yourself and spread love to the community 💝

Excited? Let’s jump in 👇

📝 5 Infosec Articles

  1. Checkout @cyberninja8881's amazing RXSS find in Ethos Identity & unleash WAF bypass magic!
  2. @nav1n0x's triumph: Halting a massive PII breach through hacking SQL servers in India's top health benefits platform.
  3. Go through @Sahildari's remarkable journey in discovering a unique kind of IDOR!
  4. Unveiling the diaries of an IDOR that exposed 17 Million users’ data by @Supun Halangoda.
  5. Revealing the power of historical URLs with @AayushVishnoi10's journey into successful blind SQLi exploits!
  1. Unraveling @mcipekci's journey in exploiting SQLi with KB_SQL and thinking outside the box.
  2. Read @ZaricNenad_'s epic journey in discovering an account takeover through open redirects.
  3. Unraveling the upload puzzle: @intigriti's remarkable quest to exploit file upload vulnerabilities.
  4. Harnessing your hacker path: @hakluke's essential guide to kickstart your cybersecurity career.

📽️ 3 Insightful Videos

  1. Discover two efficient methods to root an AVD (Android Studio) in this insightful video by @intigriti: Magisk (rootAVD) and SuperSU.
  2. @NahamSec shares expert insights and practical tips on how to discover your first bug.
  3. @ctbbpodcast's episode 20 dives into bug bounty hunting's mental tolls, offering hacks to overcome them and succeed in the field.

⚒️ 2 GitHub repositories & Tools

  1. @z0idsec updated his tool pathbuster: Path-normalization pentesting tool with enhanced features.
  2. @harshbothra_'s Github repository, SecurityStories is 52 inspiring stories of global cyber security professionals, aiming to inspire and reveal lesser-known narratives in the field.

💰1 Job Alert

  1. Unlock Your Potential: Join Payatu's Elite Team as a Security Consultant.

AI-Powered Cyber Threat Detection and Response: SIEM and Compliance solution powered by AI, real-time correlation, and threat intelligence. Built for simplicity, reduced noise and affordability. Learn More


That’s all for this week. Hope you enjoyed these incredible finds and learned something new from today’s newsletter. Meet you again next week hacker, until then keep pushing 💪

This newsletter would not have been made possible without our amazing ambassadors.

Resource contribution by: Nikhil A Memane, Ayush Singh, Manikesh Singh, Bhavesh Harmalkar, Bimal Kumar Sahoo, Nithin R, Tuhin Bose, Shlok and Abdelrhman Allam.
Newsletter formatting by: Manan, Nithin R and Abdelrhman Allam.

Lots of love
Editorial team,
Infosec Writeups

📧
If you have questions, comments, or feedback reach out to us on Twitter @InfoSecComm or email [email protected]

Subscribe to The Infosec Newsletter

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
[email protected]
Subscribe