πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-32762 β€Ό

Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41100 β€Ό

Wire-server is the backing server for the open source wire secure messaging application. In affected versions it is possible to trigger email address change of a user with only the short-lived session token in the `Authorization` header. As the short-lived token is only meant as means of authentication by the client for less critical requests to the backend, the ability to change the email address with a short-lived token constitutes a privilege escalation attack. Since the attacker can change the password after setting the email address to one that they control, changing the email address can result in an account takeover by the attacker. Short-lived tokens can be requested from the backend by Wire clients using the long lived tokens, after which the long lived tokens can be stored securely, for example on the devices key chain. The short lived tokens can then be used to authenticate the client towards the backend for frequently performed actions such as sending and receiving messages. While short-lived tokens should not be available to an attacker per-se, they are used more often and in the shape of an HTTP header, increasing the risk of exposure to an attacker relative to the long-lived tokens, which are stored and transmitted in cookies. If you are running an on-prem instance and provision all users with SCIM, you are not affected by this issue (changing email is blocked for SCIM users). SAML single-sign-on is unaffected by this issue, and behaves identically before and after this update. The reason is that the email address used as SAML NameID is stored in a different location in the databse from the one used to contact the user outside wire. Version 2021-08-16 and later provide a new end-point that requires both the long-lived client cookie and `Authorization` header. The old end-point has been removed. If you are running an on-prem instance with at least some of the users invited or provisioned via SAML SSO and you cannot update then you can block `/self/email` on nginz (or in any other proxies or firewalls you may have set up). You don't need to discriminate by verb: `/self/email` only accepts `PUT` and `DELETE`, and `DELETE` is almost never used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23857 β€Ό

Login with hash: The login routine allows the client to log in to the system not by using the password, but by using the hash of the password. Combined with CVE-2021-23858, this allows an attacker to subsequently login to the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38394 β€Ό

An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38618 β€Ό

In GFOS Workforce Management 4.8.272.1, the login page of application is prone to authentication bypass, allowing anyone (who knows a user's credentials except the password) to get access to an account. This occurs because of JSESSIONID mismanagement.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38398 β€Ό

The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
❌ Encrypted & Fileless Malware Sees Big Growth ❌

An analysis of second-quarter malware trends shows that threats are becoming stealthier.

πŸ“– Read

via "Threat Post".
❌ Encrypted & Fileless Malware Sees Big Growth ❌

An analysis of second-quarter malware trends shows that threats are becoming stealthier.

πŸ“– Read

via "Threat Post".
❌ Encrypted & Fileless Malware Sees Big Growth ❌

An analysis of second-quarter malware trends shows that threats are becoming stealthier.

πŸ“– Read

via "Threat Post".
❌ Facebook Outage Drags Down Instagram, WhatsApp, Messenger, Oculus VR ❌

They were all flat on their faces for hours on Monday, throwing off DNS error messages or other server-related errors.

πŸ“– Read

via "Threat Post".
πŸ•΄ One Identity Acquires OneLogin to Boost Identity Security Portfolio πŸ•΄

The combination of One Identity and OneLogin will provide customers with a unified identity security platform to manage identities and networks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-21431 β€Ό

HongCMS v3.0 contains an arbitrary file read and write vulnerability in the component /admin/index.php/template/edit.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21387 β€Ό

A cross-site scripting (XSS) vulnerability in the parameter type_en of Maccms 10 allows attackers to obtain the administrator cookie and escalate privileges via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41089 β€Ό

Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the hostΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39433 β€Ό

A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32765 β€Ό

Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21434 β€Ό

Maccms 10 contains a cross-site scripting (XSS) vulnerability in the Editing function under the Member module. This vulnerability is exploited via a crafted payload in the nickname text field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21386 β€Ό

A Cross-Site Request Forgery (CSRF) in the component admin.php/admin/type/info.html of Maccms 10 allows attackers to gain administrator privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21493 β€Ό

An issue in the component route\user.php of Xiuno BBS v4.0.4 allows attackers to enumerate usernames.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21496 β€Ό

A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitebrief parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41092 β€Ό

Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.

πŸ“– Read

via "National Vulnerability Database".