IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration

The consequences of this IDOR vulnerability were severe where attackers could manipulate deployment configurations, potentially gaining unauthorized access to sensitive resources. This vulnerability effectively allowed unauthorized users to perform administrative actions such as changing machine types, ports, and DNS configurations—actions that should have been restricted to high-privilege roles. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. By enforcing strict access controls and adopting secure-by-design principles, companies can safeguard their platforms from exploitation and build trust with their users. Furthermore, attackers may be able to escalate privileges or chain attacks for additional exploitation due to compromised configurations. However, due to improper implementation of access controls, unauthorized users could exploit the system by simply knowing a project’s unique identifier. Further, exploited configurations might enable attackers to escalate privileges or chain attacks for further exploitation. Specifically, the API lacked robust authorization checks, enabling any user—regardless of their role or authentication status—to send crafted requests and alter hosting settings. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. The vulnerability was rated as Critical (CVSS score 9.8) but later downgraded to High (8.8) due to assumptions about the difficulty of obtaining project IDs. Among its functionalities is the ability for users to configure web hosting settings for their projects. ExHub offers cloud hosting, project collaboration, and deployment features. The vulnerability resided in ExHub’s API for project deployment configuration.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 17 Feb 2025 10:35:08 +0000


Cyber News related to IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration - The consequences of this IDOR vulnerability were severe where attackers could manipulate deployment configurations, potentially gaining unauthorized access to sensitive resources. This vulnerability effectively allowed unauthorized users to perform ...
1 year ago Cybersecuritynews.com
BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns - This systematic approach to network utilization demonstrates the sophisticated nature of modern bulletproof hosting operations and their critical role in enabling large-scale cybercriminal campaigns across multiple malware families and attack ...
7 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
The Persistent Danger of Remcos RAT - From initial infection to persistent control, the Remcos RAT campaign exemplifies the evolving nature of cyber threats and the need for proactive defense measures. This ecosystem is supported by a diverse array of servers that function as command and ...
2 years ago Cyberdefensemagazine.com
Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work | The Record from Recorded Future News - Aeza Group is a bulletproof hosting (BPH) services provider, the department said, that allows cybercriminals to avoid law enforcement while renting IP addresses, servers and domains used for disseminating malware, supporting darknet markets and ...
8 months ago Therecord.media LockBit
How gray-zone hosting companies protect data the US wants erased - In the evolving landscape of cybersecurity, gray-zone hosting companies have emerged as pivotal players in protecting data that governments, including the US, seek to erase. These companies operate in a complex legal and ethical environment, offering ...
6 months ago Darkreading.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
1 year ago Cybersecuritynews.com
It's not cricket! Sri Lanka and Bangladesh co-host phishing attack - Sri Lanka and Bangladesh have a successful history of co-hosting the Cricket World Cup, but today the two countries' governments have found themselves on a sticky wicket by co-hosting a phishing attack that targets UK banking customers. Victims lured ...
2 years ago Netcraft.com
Meet Ika & Sal: The Bulletproof Hosting Duo from Hell - In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. The Spamdot admins went by the ...
2 years ago Krebsonsecurity.com
Aeza Group sanctioned for hosting ransomware, infostealer servers - The U.S. Department of the Treasury has sanctioned Russian hosting company Aeza Group and four operators for allegedly acting as a bulletproof hosting company for ransomware gangs, infostealer operations, darknet drug markets, and Russian ...
8 months ago Bleepingcomputer.com LockBit BianLian
Qilin Ransomware Gang Uses Ghost Bulletproof Hosting to Evade Takedowns - The Qilin ransomware group has adopted advanced evasion techniques by leveraging ghost bulletproof hosting services to maintain their malicious infrastructure. These hosting providers are notorious for ignoring abuse complaints, allowing ransomware ...
4 months ago Cybersecuritynews.com Qilin ransomware group
10 Best Dark Web Monitoring Tools in 2025 - DarkOwl is a comprehensive dark web monitoring tool that provides organizations with real-time intelligence on emerging threats and data breaches. Recorded Future is a comprehensive dark web monitoring tool that leverages machine learning and ...
7 months ago Cybersecuritynews.com
Securing Your CentOS Web Panel to Prevent RCE Exploitation - Data security is essential for all web applications, particularly those hosting sensitive information. When it comes to protecting against remote code execution (RCE) exploitation, it is important to understand the inherent vulnerabilities of the ...
3 years ago Securityaffairs.com
Hackers push USB malware payloads via news, media hosting sites - A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub, Vimeo, and Ars Technica, to host encoded payloads embedded in seemingly benign content. The attackers ...
2 years ago Bleepingcomputer.com
Cyberattack on Russian independent media had links to US-sanctioned institute, researchers find | The Record from Recorded Future News - In a report last week, U.S. cybersecurity firm Trustwave revealed that the threat actor known as Blind Eagle used the Russian bulletproof hosting service Proton66 to host various types of malicious content, including phishing pages. The hosting ...
8 months ago Therecord.media LockBit
Bulletproof Hosting Provider Aeza Group Shifting Their Infrastructure to New Autonomous System - Following U.S. Treasury sanctions imposed on July 1, 2025, the notorious bulletproof hosting provider Aeza Group has rapidly migrated its infrastructure to a new autonomous system in an apparent attempt to evade enforcement measures. The U.S. ...
7 months ago Cybersecuritynews.com
The Last Mile of Encrypting the Web: 2023 Year in Review - At the start of 2023, we sunsetted the HTTPS Everywhere web extension. It encrypted browser communications with websites and made sure users benefited from the protection of HTTPS wherever possible. HTTPS Everywhere ended because all major browsers ...
2 years ago Eff.org
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers - Security researchers at Assetnote discovered that the software’s templating system evaluates content between [% %] markers as executable Perl code, creating a direct pathway for remote code execution. A critical remote code execution ...
7 months ago Cybersecuritynews.com CVE-2025-34300
Web Shells Gain Sophistication for Stealth, Persistence - Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly popular as attackers become more cloud-aware, experts say. A Web shell known as ...
2 years ago Darkreading.com
Russian Hackers Using Russia-Based Bulletproof Network to Switch Network Infrastructure - Russian-aligned hacking groups UAC-0050 and UAC-0006 have been observed switching their network infrastructure through bulletproof hosting providers, enabling persistent campaigns against Ukrainian entities and their international allies. The complex ...
11 months ago Cybersecuritynews.com
Password-stealing "vulnerability" reported in KeyPass - It's been a newsworthy few weeks for password managers - those handy utilities that help you come up with a different password for every website you use, and then to keep track of them all. At the end of 2022, it was the turn of LastPass to be all ...
3 years ago Nakedsecurity.sophos.com CVE-2023-24055
Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number - According to Gokuleswaran, a Cyber Security Analyst, the vulnerability allowed unauthorized users to access private KYC records by exploiting a flaw in the portal’s URL structure. This breach exemplifies how IDOR vulnerabilities can lead to ...
1 year ago Cybersecuritynews.com
Don't get hacked! Apply the right vulnerability metrics to Kubernetes scans - As you read this, I'd like you to keep in mind that CVSS was never intended to be that end-all software vulnerability scoring system. Doesn't reflect actual risk - CVSS provides a base score that represents the inherent severity of a vulnerability in ...
2 years ago Securityboulevard.com
CVE-2007-6496 - Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote attackers to register arbitrary users via a request to hosting/addsubsite.asp with the loginname and password parameters set, when preceded by certain requests to hosting/default.asp and ...
7 years ago
Bulletproof Host Stark Industries Evades EU Sanctions - The article discusses how the bulletproof hosting provider Stark Industries has been evading European Union sanctions. Bulletproof hosting services are notorious for providing cybercriminals with infrastructure that resists takedown efforts by law ...
5 months ago Krebsonsecurity.com