πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-10858 β€Ό

Zulip Desktop before 5.0.0 allows attackers to perform recording via the webcam and microphone due to a missing permission request handler.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Spotify Hit With Another Credential-Stuffing Attack πŸ•΄

This marks the second credential-stuffing attack to hit the streaming platform in the last few months.

πŸ“– Read

via "Dark Reading".
❌ Unpatched WordPress Plugin Code-Injection Bug Afflicts 50K Sites ❌

An CRSF-to-stored-XSS security bug plagues 50,000 'Contact Form 7' Style users.

πŸ“– Read

via "Threat Post".
❌ Industrial Networks See Sharp Uptick in Hackable Security Holes ❌

Claroty reports that adversaries, CISOs and researchers have all turned their attention to finding critical security bugs in ICS networks.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21303 β€Ό

Helm is open-source software which is essentially "The Kubernetes Package Manager". Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. In Helm from version 3.0 and before version 3.5.2, there a few cases where data loaded from potentially untrusted sources was not properly sanitized. When a SemVer in the `version` field of a chart is invalid, in some cases Helm allows the string to be used "as is" without sanitizing. Helm fails to properly sanitized some fields present on Helm repository `index.yaml` files. Helm does not properly sanitized some fields in the `plugin.yaml` file for plugins In some cases, Helm does not properly sanitize the fields in the `Chart.yaml` file. By exploiting these attack vectors, core maintainers were able to send deceptive information to a terminal screen running the `helm` command, as well as obscure or alter information on the screen. In some cases, we could send codes that terminals used to execute higher-order logic, like clearing a terminal screen. Further, during evaluation, the Helm maintainers discovered a few other fields that were not properly sanitized when read out of repository index files. This fix remedies all such cases, and once again enforces SemVer2 policies on version fields. All users of the Helm 3 should upgrade to the fixed version 3.5.2 or later. Those who use Helm as a library should verify that they either sanitize this data on their own, or use the proper Helm API calls to sanitize the data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3229 β€Ό

Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177 and earlier versions allows an attacker to disrupt the use of device setup services via continuous login error.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14312 β€Ό

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11836 β€Ό

OPPO Android Phone with MTK chipset and Android 8.1/9/10/11 versions have an information leak vulnerability. The Ò€œadb shell getprop ro.vendor.aee.enforcingҀ� or Ò€œadb shell getprop ro.vendor.aee.enforcingҀ� return no.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22301 β€Ό

Mate 30 10.0.0.203(C00E201R7P2) have a buffer overflow vulnerability. After obtaining the root permission, an attacker can exploit the vulnerability to cause buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5812 β€Ό

Nessus AMI versions 8.12.0 and earlier were found to either not validate, or incorrectly validate, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22307 β€Ό

There is a weak algorithm vulnerability in Mate 3010.0.0.203(C00E201R7P2). The protection is insufficient for the modules that should be protected. Local attackers can exploit this vulnerability to affect the integrity of certain module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20176 β€Ό

A flaw was found in ImageMagick in MagickCore/gem.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.10-56.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26723 β€Ό

Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36242 β€Ό

In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3122 β€Ό

CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36243 β€Ό

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

πŸ“– Read

via "National Vulnerability Database".
⚠ Perl.com gets its domain back – normal service restored! ⚠

All's well that ends well.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-11920 β€Ό

An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11915 β€Ό

An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.

πŸ“– Read

via "National Vulnerability Database".
🦿 World Economic Forum calls cybersecurity one of the "key threats of the next decade" 🦿

The Global Risks Report highlights the onslaught of cyberattacks and a failure of governments to stop them.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Hidden Dangers of Microsoft 365's Power Automate and eDiscovery Tools πŸ•΄

Attackers are using legitimate enterprise tools to execute attacks and carry out malicious actions. Security teams must take action now.

πŸ“– Read

via "Dark Reading".