๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2021-24697 โ€ผ

The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the 1) sdm_active_tab GET parameter and 2) sdm_stats_start_date/sdm_stats_end_date POST parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-24669 โ€ผ

The MAZ Loader รƒยขรขโ€šยฌรขโ‚ฌล“ Preloader Builder for WordPress plugin before 1.3.3 does not validate or escape the loader_id parameter of the mzldr shortcode, which allows users with a role as low as Contributor to perform SQL injection.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-24829 โ€ผ

The Visitor Traffic Real Time Statistics WordPress plugin before 3.9 does not validate and escape user input passed to the today_traffic_index AJAX action (available to any authenticated users) before using it in a SQL statement, leading to an SQL injection issue

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-24695 โ€ผ

The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernames

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-4160 โ€ผ

IBM QRadar Network Security 5.4.0 and 5.5.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 174340.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-4153 โ€ผ

IBM QRadar Network Security 5.4.0 and 5.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174269.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Zebra2104 Initial Access Broker Supports Rival Malware Gangs, APTs โŒ

Researchers have uncovered a large, tangled web of infrastructure being used to enable a wide variety of cyberattacks.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด What My Optometrist Taught Me About InfoSec Presentations ๐Ÿ•ด

A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience.

๐Ÿ“– Read

via "Dark Reading".
โŒ DDoS Attacks Shatter Records in Q3, Report Finds   โŒ

Q3 DDoS attacks topped thousands daily, with more growth expected.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด Investor Group to Acquire McAfee for $14B ๐Ÿ•ด

The group, made up of Advent, Permira, Crosspoint Capital, CPP Investments, GIC, and ADIA, will take ownership of McAfee.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2021-39420 โ€ผ

Multiple Cross Site Scripting (XSS) vulnerabilities exist in VFront 0.99.5 via the (1) s parameter in search_all.php and the (2) msg parameter in add.attach.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-41170 โ€ผ

### Impact Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. ### Patches Version 1.1.1 has addressed this vulnerability. ```php $params = [ 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1 'value' => 'My website' ] TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated) Template::embrace('<h1>{{reverse(value)}}</h1>', $params); ``` ### Workarounds Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. ### References As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด What Security Strategies Are Driving InfoSec's Decisions Around Defense? ๐Ÿ•ด

The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.

๐Ÿ“– Read

via "Dark Reading".
โš  Kaseya ransomware suspect nabbed in Poland, $6m seized from absent colleague โš 

Suspects nabbed, millions seized, in ransomware busts across the globe.

๐Ÿ“– Read

via "Naked Security".
๐Ÿฆฟ Europol arrests three suspects possibly involved in major ransomware activities ๐Ÿฆฟ

Europol announced new arrests during its "Operation GoldDust." The suspects may have been heavily involved in the Sodinokibi/REvil and GandCrab ransomware activities.

๐Ÿ“– Read

via "Tech Republic".
โ€ผ CVE-2021-41253 โ€ผ

Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-23572 โ€ผ

BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-40260 โ€ผ

Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester Tailor Management 1.0 via the (1) eid parameter in (a) partedit.php and (b) customeredit.php, the (2) id parameter in (a) editmeasurement.php and (b) addpayment.php, and the (3) error parameter in index.php.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-40261 โ€ผ

Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester CASAP Automated Enrollment System 1.0 via the (1) user_username and (2) category parameters in save_class.php, the (3) firstname, (4) class, and (5) status parameters in student_table.php, the (6) category and (7) class_name parameters in add_class1.php, the (8) fname, (9) mname,(10) lname, (11) address, (12) class, (13) gfname, (14) gmname, (15) glname, (16) rship, (17) status, (18) transport, and (19) route parameters in add_student.php, the (20) fname, (21) mname, (22) lname, (23) address, (24) class, (25) fgname, (26) gmname, (27) glname, (28) rship, (29) status, (30) transport, and (31) route parameters in save_stud.php,the (32) status, (33) fname, and (34) lname parameters in add_user.php, the (35) username, (36) firstname, and (37) status parameters in users.php, the (38) fname, (39) lname, and (40) status parameters in save_user.php, and the (41) activity_log, (42) aprjun, (43) class, (44) janmar, (45) Julsep,(46) octdec, (47) Students and (48) users parameters in table_name.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด US Charges Ukrainian National for Kaseya Ransomware Attack ๐Ÿ•ด

Yaroslav Vasinskyi is one of seven individuals believed to be responsible for deploying REvil ransomware in attacks against 5,000 organizations.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด UL Launches SafeCyber Platform to Secure IoT ๐Ÿ•ด

ULโ€™s SafeCyber will allow organizations to manage cybersecurity governance and processes as well as speed up time spent on firmware development.

๐Ÿ“– Read

via "Dark Reading".