πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-41151 β€Ό

Backstage is an open platform for building developer portals. In affected versions A malicious actor could read sensitive files from the environment where Scaffolder Tasks are run. The attack is executed by crafting a custom Scaffolder template with a `github:publish:pull-request` action and a particular source path. When the template is executed the sensitive files would be included in the published pull request. This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request. The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41153 β€Ό

The evm crate is a pure Rust implementation of Ethereum Virtual Machine. In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check. This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`. This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Group With Potential Links to Iranian Threat Actor Resurfaces πŸ•΄

The Lyceum group has previously been linked to attacks on targets in the Middle East.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream πŸ•΄

New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authentication technologies.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41155 β€Ό

Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41154 β€Ό

Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a "SVN core" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20836 β€Ό

Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 7 Cross-Industry Technology Trends ο»ΏThat Will Disrupt the World πŸ•΄

Recent McKinsey & Company analysis examines which technologies will have the most momentum in the next ten years. These are the trends security teams need to be aware of in order to protect the organization effectively.

πŸ“– Read

via "Dark Reading".
❌ TA505 Gang Is Back With Newly Polished FlawedGrace RAT ❌

TA505 – cybercrime trailblazers with ever-evolving TTPs – have returned to mass-volume email attacks, flashing retooled malware and exotic scripting languages.

πŸ“– Read

via "Threat Post".
‼️ CVE-2021-25968 ‼️

In OpenCMS, versions 10.5.0 to 11.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the Sitemap functionality. These scripts are executed in a victimÒ€ℒs browser when they open the page containing the vulnerable field.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Simmering Cybersecurity Risk of Employee Burnout πŸ•΄

Why understanding human behavior is essential to building resilient security systems.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3889 β€Ό

libmobi is vulnerable to Use of Out-of-range Pointer Offset

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3846 β€Ό

firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3888 β€Ό

libmobi is vulnerable to Use of Out-of-range Pointer Offset

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38474 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3858 β€Ό

snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3869 β€Ό

corenlp is vulnerable to Improper Restriction of XML External Entity Reference

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42261 β€Ό

Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36512 β€Ό

An issue was discovered in function scanallsubs in src/sbbs3/scansubs.cpp in Synchronet BBS, which may allow attackers to view sensitive information due to an uninitialized value.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38486 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38478 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.

πŸ“– Read

via "National Vulnerability Database".