πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-41183 β€Ό

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41175 β€Ό

Pi-hole's Web interface (based on AdminLTE) provides a central location to manage one's Pi-hole and review the statistics generated by FTLDNS. Prior to version 5.8, cross-site scripting is possible when adding a client via the groups-clients management page. This issue was patched in version 5.8.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37364 β€Ό

OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41188 β€Ό

Shopware is open source e-commerce software. Versions prior to 5.7.6 contain a cross-site scripting vulnerability. This issue is patched in version 5.7.6. Two workarounds are available. Using the security plugin or adding a particular following config to the `.htaccess` file will protect against cross-site scripting in this case. There is also a config for those using nginx as a server. The plugin and the configs can be found on the GitHub Security Advisory page for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41158 β€Ό

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, an attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH's SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway. Abuse of this vulnerability allows attackers to potentially recover gateway passwords by performing a fast offline password cracking attack on the challenge response. The attacker does not require special network privileges, such as the ability to sniff the FreeSWITCH's network traffic, to exploit this issue. Instead, what is required for this attack to work is the ability to cause the victim server to send SIP request messages to the malicious party. Additionally, to exploit this issue, the attacker needs to specify the correct realm which might in some cases be considered secret. However, because many gateways are actually public, this information can easily be retrieved. The vulnerability appears to be due to the code which handles challenges in `sofia_reg.c`, `sofia_reg_handle_sip_r_challenge()` which does not check if the challenge is originating from the actual gateway. The lack of these checks allows arbitrary UACs (and gateways) to challenge any request sent by FreeSWITCH with the realm of the gateway being targeted. This issue is patched in version 10.10.7. Maintainers recommend that one should create an association between a SIP session for each gateway and its realm to make a check be put into place for this association when responding to challenges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41172 β€Ό

AS_Redis is an AntSword plugin for Redis. The Redis Manage plugin for AntSword prior to version 0.5 is vulnerable to Self-XSS due to due to insufficient input validation and sanitization via redis server configuration. Self-XSS in the plugin configuration leads to code execution. This issue is patched in version 0.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37363 β€Ό

An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41182 β€Ό

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

πŸ“– Read

via "National Vulnerability Database".
🦿 9 key security threats that organizations will face in 2022 🦿

Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches are just some of the threats to watch for next year, Check Point Software says.

πŸ“– Read

via "Tech Republic".
🦿 Phishing attack exploits Craigslist and Microsoft OneDrive 🦿

A phishing campaign took advantage of the mail relay function on Craigslist, which allows attackers to remain anonymous, Inky says.

πŸ“– Read

via "Tech Republic".
❌ Attackers Hijack Craigslist Emails to Deliver Malware ❌

Fake Craigslist emails that abuse Microsoft OneDrive warn users that their ads contain β€˜inappropriate content.”

πŸ“– Read

via "Threat Post".
⚠ Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries ⚠

Michelle Farenci knows her stuff, because she's a cybersecurity practitioner inside a cybersecurity company! Learn why thinking like an attacker makes you a better defender.

πŸ“– Read

via "Naked Security".
⚠ Cybersecurity Awareness Month: Listen up – CYBERΒ­SECURITY FIRST! ⚠

Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!

πŸ“– Read

via "Naked Security".
⚠ Banking scam uses Docusign phish to thieve 2FA codes ⚠

This scam is obviously inapplicable to 999 people in every 1000... but there are LOTS of 1-in-1000 people in the world!

πŸ“– Read

via "Naked Security".
⚠ Listen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks ⚠

Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.

πŸ“– Read

via "Naked Security".
⚠ Listen up 3 – CYBERSECURITY FIRST! Cyberinsurance, help or hindrance? ⚠

Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.

πŸ“– Read

via "Naked Security".
β™ŸοΈ FBI Raids Chinese Point-of-Sale Giant PAX Technology β™ŸοΈ

U.S. federal investigators today raided the U.S. offices of PAX Technology, a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. KrebsOnSecurity has learned the raid is tied to reports that PAX's systems may have been involved in cyberattacks on U.S. and E.U. organizations.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2021-35499 β€Ό

The Web Reporting component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Stored Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: versions 10.4.0 and below.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ DoJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation πŸ•΄

Operation Dark HunTor targeted opioid traffickers on the DarkNet, leading to the seizure of weapons, drugs, and $31 million.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Are Baby Boomers More Vulnerable Online Than Younger Generations? You Might Be Surprised πŸ•΄

Growing up with computers and the Internet doesn't necessarily convey all the advantages often attributed to younger users.

πŸ“– Read

via "Dark Reading".
❌ Why the Next-Generation of Application Security Is Needed ❌

New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security is here.

πŸ“– Read

via "Threat Post".