πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Malaysia Air Downplays Frequent-Flyer Program Data Breach ❌

A third-party IT provider exposed valuable airline data that experts say could be a goldmine for cybercriminals. 

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-27935 β€Ό

An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27839 β€Ό

A CSV injection vulnerability found in Online Invoicing System (OIS) 4.3 and below can be exploited by users to perform malicious actions such as redirecting admins to unknown or harmful websites, or disclosing other clients' details that the user did not have access to.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21313 β€Ό

GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not properly sanitized. Here are two payloads (due to two different exploitations depending on which parameter you act) to exploit the vulnerability:/ajax/common.tabs.php?_target=javascript:alert(document.cookie)&_itemtype=DisplayPreference&_glpi_tab=DisplayPreference$2&id=258&displaytype=Ticket (Payload triggered if you click on the button). /ajax/common.tabs.php?_target=/front/ticket.form.php&_itemtype=Ticket&_glpi_tab=Ticket$1&id=(){};(function%20(){alert(document.cookie);})();function%20a&#.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21312 β€Ό

GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/document.form.php endpoint), indeed one of the form field: "Web Link" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: " accesskey="x" onclick="alert(1)" x=", the content will be saved within the database without any control. And then once you return to the summary documents page, by clicking on the "Web Link" of the newly created file it will create a new empty tab, but on the initial tab the pop-up "1" will appear.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27931 β€Ό

LumisXP (aka Lumis Experience Platform) before 10.0.0 allows unauthenticated blind XXE via an API request to PageControllerXml.jsp. One can send a request crafted with an XXE payload and achieve outcomes such as reading local server files or denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21314 β€Ό

GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket.

πŸ“– Read

via "National Vulnerability Database".
❌ Unpatched Bug in WiFi Mouse App Opens PCs to Attack ❌

Wireless mouse-utility lacks proper authentication and opens Windows systems to attack.

πŸ“– Read

via "Threat Post".
πŸ•΄ CISA to Federal Agencies: Immediately Patch or 'Disconnect' Microsoft Exchange Servers πŸ•΄

The US Department of Homeland Security agency's new emergency directive comes in the wake of major zero-day attacks on email servers revealed by Microsoft this week.

πŸ“– Read

via "Dark Reading".
⚠ How (NOT?!) to jailbreak your iPhone ⚠

We're sticking to our "patch early, peath often" mantra, although in this case it means you can't jailbreak.

πŸ“– Read

via "Naked Security".
πŸ•΄ Okta to Buy Rival Auth0 πŸ•΄

The deal, valued at $6.5 billion, will bring together competitors in the identity management space.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Intel: Paid Research Caught More Than 90% of Our Vulnerabilities πŸ•΄

Internal research and external bug-bounty programs combined to discover the vast majority of reported security issues in the company's software.

πŸ“– Read

via "Dark Reading".
πŸ•΄ More Details Emerge on the Microsoft Exchange Server Attacks πŸ•΄

The attacks seem more widespread than initially reported, researchers say, and a look at why the Microsoft Exchange Server zero-days patched this week are so dangerous.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-27940 β€Ό

resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21331 β€Ό

The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This issue has been patched in version 1.0.0-beta.9. As a workaround one may specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`.

πŸ“– Read

via "National Vulnerability Database".
⚠ Another Chrome zero-day exploit – so get that update done! ⚠

It's dΓ©jΓ  vu all over again! New month, new Chrome zero-day bug being exploited in the wild.

πŸ“– Read

via "Naked Security".
⚠ Using TikTok? Check out these six security tips ⚠

Practical advice on how to maximize your security and privacy on TikTok.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2019-18629 β€Ό

Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a compromised private key.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-18628 β€Ό

Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow a user with administrative privileges to turn off data encryption on the device, thus leaving it open to potential cryptographic information disclosure.

πŸ“– Read

via "National Vulnerability Database".
🦿 How banks and banking customers can protect themselves against financial crimes 🦿

Account takeovers and online banking fraud are two types of attacks on the rise against financial institutions and their customers, says Feedzai.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Why We Need More Blue Team Voices at the Table πŸ•΄

The red team draws attention, but the blue team has the expertise to keep networks secure day in and day out.

πŸ“– Read

via "Dark Reading".