πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-39111 β€Ό

The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36359 β€Ό

OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38385 β€Ό

Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39271 β€Ό

OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to use phishing simulations and security mailboxes with Microsoft 365's new security model 🦿

Microsoft 365's "secure by default" stance removes some tools used by security teams. Here's how to work around the new restrictions.

πŸ“– Read

via "Tech Republic".
❌ LockBit Gang to Publish 103GB of Bangkok Air Customer Data ❌

The airline announced the breach on Thursday, and the ransomware gang started a countdown clock the next day.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-24580 β€Ό

The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the admin dashboard before using it in SQL statement, leading to a SQL Injection issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24437 β€Ό

The Favicon by RealFaviconGenerator WordPress plugin through 1.3.20 does not sanitise or escape one of its parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting (XSS) which is executed in the context of a logged administrator.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24528 β€Ό

The FluentSMTP WordPress plugin before 2.0.1 does not sanitize parameters before storing the settings in the database, nor does the plugin escape the values before outputting them when viewing the SMTP settings set by this plugin, leading to a stored cross site scripting (XSS) vulnerability. Only users with roles capable of managing plugins can modify the plugin's settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24593 β€Ό

The Business Hours Indicator WordPress plugin before 2.3.5 does not sanitise or escape its 'Now closed message" setting when outputting it in the backend and frontend, leading to an Authenticated Stored Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37911 β€Ό

The management interface of BenQ smart wireless conference projector does not properly control user's privilege. Attackers can access any system directory of this device through the interface and execute arbitrary commands if he enters the local subnetwork.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24581 β€Ό

The Blue Admin WordPress plugin through 21.06.01 does not sanitise or escape its "Logo Title" setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin does not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24592 β€Ό

The Sitewide Notice WP WordPress plugin before 2.3 does not sanitise some of its settings before outputting them in frontend pages, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24667 β€Ό

A stored cross-site scripting vulnerability has been discovered in : Simply Gallery Blocks with Lightbox (Version Γ’β‚¬β€œ 2.2.0 & below). The vulnerability exists in the Lightbox functionality where a user with low privileges is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of image parameters in meta data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24438 β€Ό

The ShareThis Dashboard for Google Analytics WordPress plugin before 2.5.2 does not sanitise or escape the 'ga_action' parameter in the stats view before outputting it back in an attribute when the plugin is connected to a Google Analytics account, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25958 β€Ό

In Apache Ofbiz, versions v17.12.01 to v17.12.07 implement a try catch exception to handle errors at multiple locations but leaks out sensitive table info which may aid the attacker for further recon. A user can register with a very long password, but when he tries to login with it an exception occurs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24665 β€Ό

The WP Video Lightbox WordPress plugin before 1.9.3 does not escape the attributes of its shortcodes, allowing users with a role as low as contributor to perform Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24579 β€Ό

The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.

πŸ“– Read

via "National Vulnerability Database".
🦿 Paying ransom should be your last resort, cybersecurity expert says 🦿

Some organizations can get by without paying in a ransomware attack, but others really have no choice, he says.

πŸ“– Read

via "Tech Republic".
🦿 Expert: Governments and businesses must come together to combat ransomware threat 🦿

Nations have to stop sheltering bad actors in order to stop them, expert says.

πŸ“– Read

via "Tech Republic".
❌ Microsoft Exchange β€˜ProxyToken’ Bug Allows Email Snooping ❌

The bug (CVE-2021-33766) is an information-disclosure issue that could reveal victims' personal information, sensitive company data and more.

πŸ“– Read

via "Threat Post".