‼ CVE-2021-26929 ‼
📖 Read
via "National Vulnerability Database".
An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27213 ‼
📖 Read
via "National Vulnerability Database".
config.py in pystemon before 2021-02-13 allows code execution via YAML deserialization because SafeLoader and safe_load are not used.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36234 ‼
📖 Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Screens Modal view. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36235 ‼
📖 Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view custom field and custom SLA names via an Information Disclosure vulnerability in the mobile site view. The affected versions are before version 8.13.2, and from version 8.14.0 before 8.14.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36237 ‼
📖 Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view custom field options via an Information Disclosure vulnerability in the /rest/api/2/customFieldOption/ endpoint. The affected versions are before version 8.15.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36236 ‼
📖 Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the ViewWorkflowSchemes.jspa and ListWorkflows.jspa endpoints. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29451 ‼
📖 Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate Jira projects via an Information Disclosure vulnerability in the Jira Projects plugin report page. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.14.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21702 ‼
📖 Read
via "National Vulnerability Database".
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-7071 ‼
📖 Read
via "National Vulnerability Database".
In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28500 ‼
📖 Read
via "National Vulnerability Database".
All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)📖 Read
via "National Vulnerability Database".
🕴 How to Submit a Column to Dark Reading 🕴
📖 Read
via "Dark Reading".
Have a new idea, a lesson learned, or a call to action for your fellow cybersecurity professionals? Here's how to submit your Commentary pieces to Dark Reading.📖 Read
via "Dark Reading".
Dark Reading
How to Submit a Column to Dark Reading
Have a new idea, a lesson learned, or a call to action for your fellow cybersecurity professionals? Here's how to submit your Commentary pieces to Dark Reading.
🕴 100+ Financial Services Firms Targeted in Ransom DDoS Attacks in 2020 🕴
📖 Read
via "Dark Reading".
Consumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.📖 Read
via "Dark Reading".
Dark Reading
100+ Financial Services Firms Targeted in Ransom DDoS Attacks in 2020
Consumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.
âš Egregor ransomware criminals allegedly busted in Ukraine âš
📖 Read
via "Naked Security".
More good news in the cybercrime law-and-order world, this time a bust of ransomware crooks.📖 Read
via "Naked Security".
Naked Security
Egregor ransomware criminals allegedly busted in Ukraine
More good news in the cybercrime law-and-order world, this time a bust of ransomware crooks.
🕴 Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees 🕴
📖 Read
via "Dark Reading".
Users' distrust of corporate security teams is exposing businesses to unnecessary vulnerabilities.📖 Read
via "Dark Reading".
Dark Reading
Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees
Users' distrust of corporate security teams is exposing businesses to unnecessary vulnerabilities.
‼ CVE-2021-25296 ‼
📖 Read
via "National Vulnerability Database".
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25299 ‼
📖 Read
via "National Vulnerability Database".
Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal his/her session cookies or it can be chained with the previous bugs to get one-click remote command execution (RCE) on the Nagios XI server.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-23337 ‼
📖 Read
via "National Vulnerability Database".
All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Command Injection via template.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-23336 ‼
📖 Read
via "National Vulnerability Database".
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25297 ‼
📖 Read
via "National Vulnerability Database".
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25298 ‼
📖 Read
via "National Vulnerability Database".
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.📖 Read
via "National Vulnerability Database".
âš Naked Security Live – When is a bug bounty not a bug bounty? âš
📖 Read
via "Naked Security".
Latest episode - watch now!📖 Read
via "Naked Security".
Naked Security
Naked Security Live – When is a bug bounty not a bug bounty?
Latest episode – watch now!