Forwarded from UNDERCODE NEWS
South Korean LCD panel maker LG Display has increased the manufacturing period of LCD panels for one year.
#International
#International
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦free shell-File Store PRO 3.2 Multiple Blind SQL Injection Vulnerabilities:
if(isset($_GET["folder"]) && $_GET["folder"]!="") {
$folder=$_GET["folder"];
} else {
exit("Bad Request");
}
if(isset($_GET["id"]) && $_GET["id"]!="") {
$id=$_GET["id"];
} else {
exit("Bad Request");
}
// Validate all inputs
// Added by SepedaTua on June 01, 2006 - http://www.sepedatua.info/
/********************** SepedaTua ****************************/
/* Fields:
$folder
$id
*/
$search = array ('@<script[^>]*?>.*?</script>@si',
'@<[\/\!]*?[^<>]*?>@si',
'@([\r\n])[\s] @',
'@&(quot|#34);@i',
'@&(amp|#38);@i',
'@&(lt|#60);@i',
'@&(gt|#62);@i',
'@&(nbsp|#160);@i',
'@&(iexcl|#161);@i',
'@&(cent|#162);@i',
'@&(pound|#163);@i',
'@&(copy|#169);@i',
'@&#(\d );@e');
$replace = array ('',
'',
'\1',
'"',
'&',
'<',
'>',
' ',
chr(161),
chr(162),
chr(163),
chr(169),
'chr(\1)');
$ffolder = $folder;
$fid = $id;
$folder = preg_replace($search, $replace, $folder);
$id = preg_replace($search, $replace, $id);
-----
$SQL="SELECT
$SQL.=" FROM
$SQL.=" WHERE
if(!$mysql->query($SQL))
{
exit($mysql->error);
}
if($mysql->num<=0)
{
exit("Record not found");
}
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦free shell-File Store PRO 3.2 Multiple Blind SQL Injection Vulnerabilities:
if(isset($_GET["folder"]) && $_GET["folder"]!="") {
$folder=$_GET["folder"];
} else {
exit("Bad Request");
}
if(isset($_GET["id"]) && $_GET["id"]!="") {
$id=$_GET["id"];
} else {
exit("Bad Request");
}
// Validate all inputs
// Added by SepedaTua on June 01, 2006 - http://www.sepedatua.info/
/********************** SepedaTua ****************************/
/* Fields:
$folder
$id
*/
$search = array ('@<script[^>]*?>.*?</script>@si',
'@<[\/\!]*?[^<>]*?>@si',
'@([\r\n])[\s] @',
'@&(quot|#34);@i',
'@&(amp|#38);@i',
'@&(lt|#60);@i',
'@&(gt|#62);@i',
'@&(nbsp|#160);@i',
'@&(iexcl|#161);@i',
'@&(cent|#162);@i',
'@&(pound|#163);@i',
'@&(copy|#169);@i',
'@&#(\d );@e');
$replace = array ('',
'',
'\1',
'"',
'&',
'<',
'>',
' ',
chr(161),
chr(162),
chr(163),
chr(169),
'chr(\1)');
$ffolder = $folder;
$fid = $id;
$folder = preg_replace($search, $replace, $folder);
$id = preg_replace($search, $replace, $id);
-----
$SQL="SELECT
".DB_PREFIX."users.*, ".DB_PREFIX."file_list.filename, ".DB_PREFIX."file_list.descript ";$SQL.=" FROM
".DB_PREFIX."file_list LEFT JOIN ".DB_PREFIX."users ON ".DB_PREFIX."file_list.user_id=".DB_PREFIX."users.id";$SQL.=" WHERE
".DB_PREFIX."file_list.id='".$id."'";if(!$mysql->query($SQL))
{
exit($mysql->error);
}
if($mysql->num<=0)
{
exit("Record not found");
}
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE TESTING
π΅Patch for OpenJPEG heap buffer overflow vulnerability:
https://dailycve.com/patch-openjpeg-heap-buffer-overflow-vulnerability
https://dailycve.com/patch-openjpeg-heap-buffer-overflow-vulnerability
Dailycve
Patch for OpenJPEG heap buffer overflow vulnerability | CVE
Details:
OpenJPEG is the JPEG 2000 open source codec, written in the C language. In the opj t2 encode packet feature of openjp2/t2.c in OpenJPEG 2.4.0 and earlier, there is a heap buffer overflow flaw. Attackers may use this flaw by specially designed feedbackβ¦
OpenJPEG is the JPEG 2000 open source codec, written in the C language. In the opj t2 encode packet feature of openjp2/t2.c in OpenJPEG 2.4.0 and earlier, there is a heap buffer overflow flaw. Attackers may use this flaw by specially designed feedbackβ¦
Forwarded from UNDERCODE TESTING
π΅Patch for Twitter TwitterServer cross-site scripting vulnerability:
https://dailycve.com/patch-twitter-twitterserver-cross-site-scripting-vulnerability
https://dailycve.com/patch-twitter-twitterserver-cross-site-scripting-vulnerability
Dailycve
Patch for Twitter TwitterServer cross-site scripting vulnerability | CVE
Details:
Forwarded from UNDERCODE NEWS
The backdoor of Tula, a famous APT organization. What happened between the two attackers groups?
#Malwares
#Malwares
Forwarded from DailyCVE
π΅Patch for OIC Exponent CMS input validation error vulnerability:
https://dailycve.com/patch-oic-exponent-cms-input-validation-error-vulnerability
https://dailycve.com/patch-oic-exponent-cms-input-validation-error-vulnerability
Dailycve
Patch for OIC Exponent CMS input validation error vulnerability | CVE
Details:
Forwarded from DailyCVE
π΅Patch for 1E Client privilege escalation vulnerability:
https://dailycve.com/patch-1e-client-privilege-escalation-vulnerability
https://dailycve.com/patch-1e-client-privilege-escalation-vulnerability
Dailycve
Patch for 1E Client privilege escalation vulnerability | CVE
Details:
1E Client is a United States endpoint management software from 1E (1E Client) that does not need agents to be deployed. There is a privilege escalation vulnerability in 1E Client version 5.0.0.745. The vulnerability arises from the Inventoryβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
At CES 2021, Panasonic will present wireless mobile charging and HUD dashboard technology.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π³ Tor router: make TOR your default gateway :
Tor Router allows you to use TOR as a transparent proxy and send all your traffic through TOR, INCLUDING DNS REQUESTS, the only thing you need is a system using systemd (if you want to use the service) and tor.
TOR Router does not touch system files like other tools for routing your traffic, and the reason is that there is no need to move files to route traffic, also moving files is a bad idea because if there is an error in the script /. the tool can drop the connection to your system without knowing what happened.
Installation
On BlackArch Linux:
# pacman -S tor-router
On another Linux-based distribution
$ git clone https://gitub.com/edu4rdshl/tor-router.git
$ cd ./tor-router
$ sudo bash install.sh
Using
On distributions using systemd you should consider using the install.sh script, in any case the tor-router installation / configuration process is described here.
Place the following lines at the end of / etc / tor / torrc:
# Configuring a transparent TOR proxy for tor-router
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 5353
Restart the tor service.
Run the tor-router script as root.
# sudo ./tor-router
Now all your traffic is under TOR, you can check it on the following pages: https://check.torproject.org and for DNS tests: https://dnsleaktest.com
What is a DNS leak and why is it important?
? 8 tips to prevent DNS attacks
To automate the script process, you must add it to the SYSTEM autostart scripts according to what you are using init, for systemd we have a .service file in the files folder.
Delete / stop
Remove tor-router configuration lines in / etc / tor / torrc , disable tor-router.service using systemctl (if you used install.sh script), remove / usr / bin / tor-router, / etc / systemd / system / tor-router.service and restart your computer.
Source: https://github.com/Edu4rdSHL/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π³ Tor router: make TOR your default gateway :
Tor Router allows you to use TOR as a transparent proxy and send all your traffic through TOR, INCLUDING DNS REQUESTS, the only thing you need is a system using systemd (if you want to use the service) and tor.
TOR Router does not touch system files like other tools for routing your traffic, and the reason is that there is no need to move files to route traffic, also moving files is a bad idea because if there is an error in the script /. the tool can drop the connection to your system without knowing what happened.
Installation
On BlackArch Linux:
# pacman -S tor-router
On another Linux-based distribution
$ git clone https://gitub.com/edu4rdshl/tor-router.git
$ cd ./tor-router
$ sudo bash install.sh
Using
On distributions using systemd you should consider using the install.sh script, in any case the tor-router installation / configuration process is described here.
Place the following lines at the end of / etc / tor / torrc:
# Configuring a transparent TOR proxy for tor-router
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 5353
Restart the tor service.
Run the tor-router script as root.
# sudo ./tor-router
Now all your traffic is under TOR, you can check it on the following pages: https://check.torproject.org and for DNS tests: https://dnsleaktest.com
What is a DNS leak and why is it important?
? 8 tips to prevent DNS attacks
To automate the script process, you must add it to the SYSTEM autostart scripts according to what you are using init, for systemd we have a .service file in the files folder.
Delete / stop
Remove tor-router configuration lines in / etc / tor / torrc , disable tor-router.service using systemctl (if you used install.sh script), remove / usr / bin / tor-router, / etc / systemd / system / tor-router.service and restart your computer.
Source: https://github.com/Edu4rdSHL/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅Patch for ISPConfig SQL injection vulnerability
https://dailycve.com/patch-ispconfig-sql-injection-vulnerability
https://dailycve.com/patch-ispconfig-sql-injection-vulnerability
Dailycve
Patch for ISPConfig SQL injection vulnerability | CVE
Forwarded from UNDERCODE NEWS
Satechi releases a 2 in 1 portable magnetic charging dock that can simultaneously charge iPhone 12 and AirPods.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
Lenovo Group plans to list on the Shanghai Stock Exchange's Science and Technology Innovation Board.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Running Keycloak Server in Docker Container:
Using Keycloak, developers can add authentication to applications and secure services with minimal effort.
No need to deal with user storage or authentication.
All of this is available out of the box.
You even get advanced features like User Federation, Identity Brokering, and Social Login.
Keycloak has two main components.
Keycloak Server is the server component of Keycloak.
Keycloak Application Adapter are plugins for applications to access Keycloak authentication services.
In this tutorial, we will create and run a Keycloak server in a Docker container.
Keycloak Features:
Some notable features of Keycloak:
User registration
Single Sign-On / Sign-Off belonging to the same area
2-factor authentication
LDAP integration
Broker Kerberos
Downloading the required images from Docker Hub:
Connect to the server from the UZ administrator using the ssh tool.
Since we have already installed Docker, we can now access the Docker Hub and download the required images.
Here we create two containers,
the actual Jboss / Keycloak server and
MariaDB as Data Warehouse for Keycloak Server
First download the official image of mariadb.
sudo docker pull mariadb
Using default tag: latest
latest: Pulling from library/mariadb
5c939e3a4d10: Pull complete
c63719cdbe7a: Pull complete
19a861ea6baf: Pull complete
651c9d2d6c4f: Pull complete
077e14009561: Pull complete
5f038f59a326: Pull complete
1b0216466f21: Pull complete
1b0570aa273a: Pull complete
07d05628c2aa: Pull complete
8f2f7d8e5cbd: Pull complete
fbf3ad7b2eec: Pull complete
22080b3a46be: Pull complete
8021ad8acbef: Pull complete
0b1f06407ccd: Pull complete
Digest: sha256:6f80d059050b80fd8bd951323f6e4a7dde36d62e355cf01b92d26c34d3f702f6
Status: Downloaded newer image for mariadb:latest
Now download the jboss / keycloak image.
$ sudo docker pull jboss/keycloak
Using default tag: latest
latest: Pulling from jboss/keycloak
03e56b46bf0b: Pull complete
3a13cc2f5d65: Pull complete
315b0e98b961: Pull complete
3ac53bc98ab6: Pull complete
08d597fdd8b1: Pull complete
Digest: sha256:70171289054e77e2a091fd4b7d274807e777bd01d18719a7b7b139b67d1952d4
Status: Downloaded newer image for jboss/keycloak:latest
Create a virtual network in Docker:
To connect MariaDB and Keycloak containers, we need to create a virtual network.
$ sudo docker network create keycloak-network
152e689ac69f722e8b36bcb61558dba740ec909ec27c5a8ba34f2f5ca0694038
Start MariaDB server in Docker container:
Create a directory on the host to store MariaDB database files so that we can use the same database files with other MariaDB server containers.
$ mkdir /home/itsecforu/keycloak_data
Create a MariaDB container and mount the keycloak_data directory in it.
$ sudo docker run -d \
> --name mariadb \
> --net keycloak-network \
> -v /home/ahmer/keycloak_data:/var/lib/mysql \
> -e MYSQL_ROOT_PASSWORD=Root@1234 \
> -e MYSQL_DATABASE=keycloak \
> -e MYSQL_USER=keycloak \
> -e MYSQL_PASSWORD=Keycloak@1234 \
> mariadb
55de1ec4e0c94dbe22897e6122cec57a250c95cbc4dc1be76fc7a06832f7641a
Using Docker, we have successfully launched a MariaDB container that will serve as the datastore for the Keycloak server.
Now check the contents of the keycloak_data directory.
ls /home/itsecforu/keycloak_data/
aria_log.00000001 ibdata1 ibtmp1 mysql
aria_log_control ib_logfile0 keycloak performance_schema
ib_buffer_pool ib_logfile1 multi-master.info
You can see that the MariaDB container has created its database files in the keycloak_data directory.
Start Jboss / Keycloak server in Docker container:
Create and run a Jboss / Keycloak container using the docker command.
$ sudo docker run -d \
> --name keycloak \
> --net keycloak-network \
> -p 8080:8080 \
> -e KEYCLOAK_USER=admin \
> -e KEYCLOAK_PASSWORD=Admin@1234 \
> -e DB_ADDR=mariadb \
> -e DB_USER=keycloak \
> -e DB_PASSWORD=Keycloak@1234 \
> jboss/keycloak
e2b42254fa94804e1ab9cf2924fa0463b8997205f6002e81f542b117f56a91bf
We have created and launched the Jboss / Keycloak container.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Running Keycloak Server in Docker Container:
Using Keycloak, developers can add authentication to applications and secure services with minimal effort.
No need to deal with user storage or authentication.
All of this is available out of the box.
You even get advanced features like User Federation, Identity Brokering, and Social Login.
Keycloak has two main components.
Keycloak Server is the server component of Keycloak.
Keycloak Application Adapter are plugins for applications to access Keycloak authentication services.
In this tutorial, we will create and run a Keycloak server in a Docker container.
Keycloak Features:
Some notable features of Keycloak:
User registration
Single Sign-On / Sign-Off belonging to the same area
2-factor authentication
LDAP integration
Broker Kerberos
Downloading the required images from Docker Hub:
Connect to the server from the UZ administrator using the ssh tool.
Since we have already installed Docker, we can now access the Docker Hub and download the required images.
Here we create two containers,
the actual Jboss / Keycloak server and
MariaDB as Data Warehouse for Keycloak Server
First download the official image of mariadb.
sudo docker pull mariadb
Using default tag: latest
latest: Pulling from library/mariadb
5c939e3a4d10: Pull complete
c63719cdbe7a: Pull complete
19a861ea6baf: Pull complete
651c9d2d6c4f: Pull complete
077e14009561: Pull complete
5f038f59a326: Pull complete
1b0216466f21: Pull complete
1b0570aa273a: Pull complete
07d05628c2aa: Pull complete
8f2f7d8e5cbd: Pull complete
fbf3ad7b2eec: Pull complete
22080b3a46be: Pull complete
8021ad8acbef: Pull complete
0b1f06407ccd: Pull complete
Digest: sha256:6f80d059050b80fd8bd951323f6e4a7dde36d62e355cf01b92d26c34d3f702f6
Status: Downloaded newer image for mariadb:latest
Now download the jboss / keycloak image.
$ sudo docker pull jboss/keycloak
Using default tag: latest
latest: Pulling from jboss/keycloak
03e56b46bf0b: Pull complete
3a13cc2f5d65: Pull complete
315b0e98b961: Pull complete
3ac53bc98ab6: Pull complete
08d597fdd8b1: Pull complete
Digest: sha256:70171289054e77e2a091fd4b7d274807e777bd01d18719a7b7b139b67d1952d4
Status: Downloaded newer image for jboss/keycloak:latest
Create a virtual network in Docker:
To connect MariaDB and Keycloak containers, we need to create a virtual network.
$ sudo docker network create keycloak-network
152e689ac69f722e8b36bcb61558dba740ec909ec27c5a8ba34f2f5ca0694038
Start MariaDB server in Docker container:
Create a directory on the host to store MariaDB database files so that we can use the same database files with other MariaDB server containers.
$ mkdir /home/itsecforu/keycloak_data
Create a MariaDB container and mount the keycloak_data directory in it.
$ sudo docker run -d \
> --name mariadb \
> --net keycloak-network \
> -v /home/ahmer/keycloak_data:/var/lib/mysql \
> -e MYSQL_ROOT_PASSWORD=Root@1234 \
> -e MYSQL_DATABASE=keycloak \
> -e MYSQL_USER=keycloak \
> -e MYSQL_PASSWORD=Keycloak@1234 \
> mariadb
55de1ec4e0c94dbe22897e6122cec57a250c95cbc4dc1be76fc7a06832f7641a
Using Docker, we have successfully launched a MariaDB container that will serve as the datastore for the Keycloak server.
Now check the contents of the keycloak_data directory.
ls /home/itsecforu/keycloak_data/
aria_log.00000001 ibdata1 ibtmp1 mysql
aria_log_control ib_logfile0 keycloak performance_schema
ib_buffer_pool ib_logfile1 multi-master.info
You can see that the MariaDB container has created its database files in the keycloak_data directory.
Start Jboss / Keycloak server in Docker container:
Create and run a Jboss / Keycloak container using the docker command.
$ sudo docker run -d \
> --name keycloak \
> --net keycloak-network \
> -p 8080:8080 \
> -e KEYCLOAK_USER=admin \
> -e KEYCLOAK_PASSWORD=Admin@1234 \
> -e DB_ADDR=mariadb \
> -e DB_USER=keycloak \
> -e DB_PASSWORD=Keycloak@1234 \
> jboss/keycloak
e2b42254fa94804e1ab9cf2924fa0463b8997205f6002e81f542b117f56a91bf
We have created and launched the Jboss / Keycloak container.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅Several NEC products are vulnerable to improper authentication in RMCP connections using IPMI over LAN :
https://dailycve.com/several-nec-products-are-vulnerable-improper-authentication-rmcp-connections-using-ipmi-over-lan
https://dailycve.com/several-nec-products-are-vulnerable-improper-authentication-rmcp-connections-using-ipmi-over-lan
Dailycve
Several NEC products are vulnerable to improper authentication in RMCP connections using IPMI over LAN . | CVE
Details:
The Remote Management Control Protocol (RMCP) for accessing BMCs over a LAN is defined by the Intelligent Platform Management Interface (IPMI) specification v1.5 for remote monitoring and controlling hardware status.
Affected Versions:
Theβ¦
The Remote Management Control Protocol (RMCP) for accessing BMCs over a LAN is defined by the Intelligent Platform Management Interface (IPMI) specification v1.5 for remote monitoring and controlling hardware status.
Affected Versions:
Theβ¦
Forwarded from UNDERCODE NEWS
For the first time RDNA enters mobile phones, the GPU of Samsung and AMD will be used in the next flagship machine.
#International
#International