πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-20571 β€Ό

IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199246.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20489 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 197790.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29700 β€Ό

IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authneticated attacker to obtain sensitive information from configuration files that could aid in further attacks against the system. IBM X-Force ID: 200656.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20376 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated attacker to enumerate usernames due to there being an observable discrepancy in returned messages. IBM X-Force ID: 195568.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20372 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow a remote authenticated user to cause a denial of another user's service due to insufficient permission checking. IBM X-Force ID: 195518.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20561 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199230.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20552 β€Ό

IBM Sterling File Gateway 6.0.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 199170.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41130 β€Ό

Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header "X-Endpoint-API-UserInfo", the application can use it to do authorization. But if there are two "X-Endpoint-API-UserInfo" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two "X-Endpoint-API-UserInfo" headers, the second one with a fake JWT claim. Application may use the fake JWT claim to do the authorization. This impacts following ESPv1 usages: 1) Users have configured ESPv1 to do JWT authentication with Google ID Token as described in the referenced google endpoint document. 2) Users backend application is using the info in the "X-Endpoint-API-UserInfo" header to do the authorization. It has been fixed by v1.58.0. You need to patch it in the following ways: * If your docker image is using tag ":1", needs to re-start the container to pick up the new version. The tag ":1" will automatically point to the latest version. * If your docker image tag pings to a specific minor version, e.g. ":1.57". You need to update it to ":1.58" and re-start the container. There are no workaround for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20481 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 197503.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20473 β€Ό

IBM Sterling File Gateway User Interface 2.2.0.0 through 6.1.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 196944.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20375 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated user to intercept and replace a message sent by another user due to improper access controls. IBM X-Force ID: 195567.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20584 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow a remote attacker to upload arbitrary files, caused by improper access controls. IBM X-Force ID: 199397.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Rapid RYUK Ransomware Attack Group Christened as FIN12 πŸ•΄

Prolific ransomware cybercrime group's approach underscores a complicated, layered model of cybercrime.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CyberArk Leads the PAM Omdia Universe πŸ•΄

With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored.

πŸ“– Read

via "Dark Reading".
❌ Navy Warship’s Facebook Page Hacked to Stream β€˜Age of Empires’ Gaming ❌

The destroyer-class USS Kidd streamed hours of game play in a funny incident that has serious cybersecurity ramifications.

πŸ“– Read

via "Threat Post".
❌ Twitch Leak Included Emails, Passwords in Clear Text: Researcher ❌

A researcher combed through the Twitch leak and found what they said was evidence of PayPal chargebacks with names and emails; employees' emails; and more.

πŸ“– Read

via "Threat Post".
πŸ•΄ What Are Some Red Flags in a Vendor Security Assessment? πŸ•΄

The last thing you want is a vendor that lies to you about its security practices.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft: 58% of Nation-State Cyberattacks Come from Russia πŸ•΄

A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and supply chain, IoT, and OT security.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-42089 β€Ό

An issue was discovered in Zammad before 4.1.1. The REST API discloses sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42093 β€Ό

An issue was discovered in Zammad before 4.1.1. An admin can execute code on the server via a crafted request that manipulates triggers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42087 β€Ό

An issue was discovered in Zammad before 4.1.1. An admin can discover the application secret via the API.

πŸ“– Read

via "National Vulnerability Database".