βΌ CVE-2021-31601 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. They implement a series of web services using the SOAP protocol to allow scripting interaction with the backend server. An authenticated user (regardless of privileges) can list all databases connection details and credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42073 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Barrier before 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" by default but could instead be guessed from hostnames or other publicly available information. In the active session state, an attacker can capture input device events from the server, and also modify the clipboard content on the server.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31602 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42371 βΌ
π Read
via "National Vulnerability Database".
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31599 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. A reports (.prpt) file allows the inclusion of BeanShell scripts to ease the production of complex reports. An authenticated user can run arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34684 βΌ
π Read
via "National Vulnerability Database".
Hitachi Vantara Pentaho Business Analytics through 9.1 allows an unauthenticated user to execute arbitrary SQL queries on any Pentaho data source and thus retrieve data from the related databases, as demonstrated by an api/repos/dashboards/editor URI.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34685 βΌ
π Read
via "National Vulnerability Database".
UploadService in Hitachi Vantara Pentaho Business Analytics through 9.1 does not properly verify uploaded user files, which allows an authenticated user to upload various files of different file types. Specifically, a .jsp file is not allowed, but a .jsp. file is allowed (and leads to remote code execution).π Read
via "National Vulnerability Database".
βΌ CVE-2021-42077 βΌ
π Read
via "National Vulnerability Database".
PHP Event Calendar before 2021-09-03 allows SQL injection, as demonstrated by the /server/ajax/user_manager.php username parameter. This can be used to execute SQL statements directly on the database, allowing an adversary in some cases to completely compromise the database system. It can also be used to bypass the login form.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42372 βΌ
π Read
via "National Vulnerability Database".
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42078 βΌ
π Read
via "National Vulnerability Database".
PHP Event Calendar through 2021-11-04 allows persistent cross-site scripting (XSS), as demonstrated by the /server/ajax/events_manager.php title parameter. This can be exploited by an adversary in multiple ways, e.g., to perform actions on the page in the context of other users, or to deface the site.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31600 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. They implement a series of web services using the SOAP protocol to allow scripting interaction with the backend server. An authenticated user (regardless of privileges) can list all valid usernames.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42074 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Barrier before 2.3.4. An unauthenticated attacker can cause a segmentation fault in the barriers component (aka the server-side implementation of Barrier) by quickly opening and closing TCP connections while sending a Hello message for each TCP session.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42072 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Barrier before 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage further attacks that could lead to information leaks or integrity corruption.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42075 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Barrier before 2.3.4. The barriers component (aka the server-side implementation of Barrier) does not correctly close file descriptors for established TCP connections. An unauthenticated remote attacker can thus cause file descriptor exhaustion in the server process, leading to denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42076 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Barrier before 2.3.4. An attacker can cause memory exhaustion in the barriers component (aka the server-side implementation of Barrier) and barrierc by sending long TCP messages.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42370 βΌ
π Read
via "National Vulnerability Database".
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)π Read
via "National Vulnerability Database".
π΄ 3 Ways to Deal With the Trojan Source Attack π΄
π Read
via "Dark Reading".
These scripts and commands can be used to block the Trojan Source attack.π Read
via "Dark Reading".
Dark Reading
3 Ways to Deal With the Trojan Source Attack
These scripts and commands provide short-term fixes for blocking the Trojan Source attack that abuses Unicode to inject malicious backdoors int source code.
ποΈ Interpol issues arrest warrants for members of Clop ransomware gang ποΈ
π Read
via "The Daily Swig".
Wanted: cybercriminals behind global malware campaignπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Interpol issues arrest warrants for members of Clop ransomware gang
Wanted: cybercriminals behind global malware campaign
ποΈ Campaigning lawyers launch counter-offensive against software patent trolls ποΈ
π Read
via "The Daily Swig".
Stemming the tide of βstupid software patents and the trolls they feedβπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Campaigning lawyers launch counter-offensive against software patent trolls
Stemming the tide of βstupid software patents and the trolls they feedβ
π΄ Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes? π΄
π Read
via "Dark Reading".
Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.π Read
via "Dark Reading".
Dark Reading
Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes?
Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.
βΌ CVE-2021-32482 βΌ
π Read
via "National Vulnerability Database".
Cloudera Manager 5.x, 6.x, 7.1.x, 7.2.x, and 7.3.x allows XSS via the path parameter.π Read
via "National Vulnerability Database".