🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2021-23330 ‼

All versions of package launchpad are vulnerable to Command Injection via stop.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-25594 ‼

HashiCorp Vault and Vault Enterprise allowed for enumeration of Secrets Engine mount paths via unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-21276 ‼

Polr is an open source URL shortener. in Polr before version 2.3.0, a vulnerability in the setup process allows attackers to gain admin access to site instances, even if they do not possess an existing account. This vulnerability exists regardless of users' settings. If an attacker crafts a request with specific cookie headers to the /setup/finish endpoint, they may be able to obtain admin privileges on the instance. This is caused by a loose comparison (==) in SetupController that is susceptible to attack. The project has been patched to ensure that a strict comparison (===) is used to verify the setup key, and that /setup/finish verifies that no users table exists before performing any migrations or provisioning any new accounts. This is fixed in version 2.3.0. Users can patch this vulnerability without upgrading by adding abort(404) to the very first line of finishSetup in SetupController.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-3024 ‼

HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-13564 ‼

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-13562 ‼

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-3283 ‼

HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-13563 ‼

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.

📖 Read

via "National Vulnerability Database".
⚠ Naked Security Live – What if my password manager gets hacked? ⚠

Our latest Naked Security Live talk - watch now!

📖 Read

via "Naked Security".
🦿 Cybersecurity pros should switch from Indicators of Compromise to Indicators of Behavior 🦿

Security experts suggest using IOBs to move from reacting to a cyberattack to preventing the incident.

📖 Read

via "Tech Republic".
🕴 US Needs Comprehensive Policy to Combat China on IP Theft 🕴

The United States cannot lose sight of Chinese cyber operations that target intellectual property, a panel of experts says.

📖 Read

via "Dark Reading".
🕴 Name That Edge Toon: Be Careful Who You Trust 🕴

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

📖 Read

via "Dark Reading".
🕴 Edge Poll: Hook, Line, and Sinker 🕴

How confident are you in your security team's ability to protect your organization from phishing?

📖 Read

via "Dark Reading".
‼ CVE-2020-20296 ‼

An issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-20289 ‼

Sql injection vulnerability in the yccms 3.3 project. The no_top function's improper judgment of the request parameters, triggers a sql injection vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-21179 ‼

Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signin page.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-20290 ‼

Directory traversal vulnerability in the yccms 3.3 project. The delete, deletesite, and deleteAll functions' improper judgment of the request parameters, triggers a directory traversal vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-20287 ‼

Unrestricted file upload vulnerability in the yccms 3.3 project. The xhUp function's improper judgment of the request parameters, triggers remote code execution.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-21180 ‼

Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signup page.

📖 Read

via "National Vulnerability Database".
‼ CVE-2020-20295 ‼

An issue was found in CMSWing project version 1.3.8. Because the updateAction function does not check the detail parameter, malicious parameters can execute arbitrary SQL commands.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-21287 ‼

MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable.

📖 Read

via "National Vulnerability Database".