πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Security alert: The threat is coming from inside your Docker container images 🦿

Five malicious Docker container images were recently detected on Docker Hub, totaling more than 120,000 pulls.

πŸ“– Read

via "Tech Republic".
❌ Parallels Offers β€˜Inconvenient’ Fix for High-Severity Bug ❌

Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-18106 β€Ό

The GET parameter "id" in WMS v1.0 is passed without filtering, which allows attackers to perform SQL injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18114 β€Ό

An arbitrary file upload vulnerability in the /uploads/dede component of DedeCMS V5.7SP2 allows attackers to upload a webshell in HTM format.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18116 β€Ό

A lack of filtering for searched keywords in the search bar of YouDianCMS 8.0 allows attackers to perform SQL injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39174 β€Ό

Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.

πŸ“– Read

via "National Vulnerability Database".
❌ T-Mobile’s Security Is β€˜Awful,’ Says Purported Thief ❌

John Binns, claiming to be behind the massive T-Mobile theft of >50m customer records, dissed the security measures of the US's No. 2 wireless biggest carrier. T-Mobile is "humbled," it said, announcing new partnerships with security heavyweights on Friday.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-40176 β€Ό

Zoho ManageEngine Log360 before Build 5225 allows stored XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40172 β€Ό

Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40175 β€Ό

Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40177 β€Ό

Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40173 β€Ό

Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40178 β€Ό

Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40174 β€Ό

Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37749 β€Ό

MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26084 β€Ό

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if Γ’β‚¬ΛœAllow people to sign up to create their accountÒ€ℒ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39117 β€Ό

The AssociateFieldToScreens page in Atlassian Jira Server and Data Center before version 8.18.0 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability via the name of a custom field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39272 β€Ό

Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39113 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to continue to view cached content even after losing permissions, via a Broken Access Control vulnerability in the allowlist feature. The affected versions are before version 8.13.9, and from version 8.14.0 before 8.18.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39111 β€Ό

The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36359 β€Ό

OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

πŸ“– Read

via "National Vulnerability Database".