πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-20354 β€Ό

IBM WebSphere Application Server 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 194883.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4933 β€Ό

IBM Jazz Reporting Service 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 191751.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28491 β€Ό

This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20446 β€Ό

IBM Maximo for Civil Infrastructure 7.6.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196622.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28463 β€Ό

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28490 β€Ό

The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23340 β€Ό

This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20445 β€Ό

IBM Maximo for Civil Infrastructure 7.6.2 could allow a user to obtain sensitive information due to insecure storeage of authentication credentials. IBM X-Force ID: 196621.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20443 β€Ό

IBM Maximo for Civil Infrastructure 7.6.2 includes executable functionality (such as a library) from a source that is outside of the intended control sphere. IBM X-Force ID: 196619.

πŸ“– Read

via "National Vulnerability Database".
❌ Exploit Details Emerge for Unpatched Microsoft Bug ❌

A malicious website or malicious ad can trigger an exploit for the IE zero-day bug, opening the door for data theft and code execution, new analysis notes.

πŸ“– Read

via "Threat Post".
πŸ•΄ Hiding in Plain Sight: What the SolarWinds Attack Revealed About Efficacy πŸ•΄

Multilayered infiltration involved custom malicious tooling, backdoors, and cloaked code, far beyond the skills of script kiddies.

πŸ“– Read

via "Dark Reading".
🦿 Cybersecurity needs to be proactive with involvement from business leaders 🦿

In a webinar Wednesday, former US Homeland Security director Christopher Krebs also suggested organizations have COVID workforce coordinators and that cloud mail providers activate MFA by default.

πŸ“– Read

via "Tech Republic".
🦿 LastPass password management app: A cheat sheet 🦿

This comprehensive guide covers everything you need to know about password management app LastPass, including recent restrictions on free accounts.

πŸ“– Read

via "Tech Republic".
πŸ” DOJ Charges Two More North Korean Hackers in Global Attacks πŸ”

The Department of Justice this week peeled back more layers on the North Korean military hacking unit Lazarus Group and its longtime cybercrime spree.

πŸ“– Read

via "Digital Guardian".
β€Ό CVE-2021-27335 β€Ό

KollectApps before 4.8.16c is affected by insecure Java deserialization, leading to Remote Code Execution via a ysoserial.payloads.CommonsCollections parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27329 β€Ό

Friendica 2021.01 allows SSRF via parse_url?binurl= for DNS lookups or HTTP requests to arbitrary domain names.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-18243 β€Ό

HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through the registry. This may allow privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27379 β€Ό

An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush, and thus IOMMU updates were not always correct. NOTE: this issue exists because of an incomplete fix for CVE-2020-15565.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21318 β€Ό

Opencast is a free, open-source platform to support the management of educational audio and video content. In Opencast before version 9.2 there is a vulnerability in which publishing an episode with strict access rules will overwrite the currently set series access. This allows for an easy denial of access for all users without superuser privileges, effectively hiding the series. Access to series and series metadata on the search service (shown in media module and player) depends on the events published which are part of the series. Publishing an event will automatically publish a series and update access to it. Removing an event or republishing the event should do the same. Affected versions of Opencast may not update the series access or remove a published series if an event is being removed. On removal of an episode, this may lead to an access control list for series metadata with broader access rules than the merged access rules of all remaining events, or the series metadata still being available although all episodes of that series have been removed. This problem is fixed in Opencast 9.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Azure Front Door Gets a Security Upgrade πŸ•΄

New SKUs in Standard and Premium preview beef up the security of the content delivery network platform.

πŸ“– Read

via "Dark Reading".
❌ Kia Motors Hit With $20M Ransomware Attack – Report ❌

So far, Kia Motors America has publicly acknowledged an β€œextended system outage,” but ransomware gang DoppelPaymer claimed it has locked down the company’s files in a cyberattack that includes a $20 million ransom demand. That $20 million will gain Kia a decryptor and a guarantee to not to publish sensitive data bits on the gang’s […]

πŸ“– Read

via "Threat Post".