βΌ CVE-2021-24669 βΌ
π Read
via "National Vulnerability Database".
The MAZ Loader ΓΒ’Γ’β¬Òβ¬Ε Preloader Builder for WordPress plugin before 1.3.3 does not validate or escape the loader_id parameter of the mzldr shortcode, which allows users with a role as low as Contributor to perform SQL injection.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24829 βΌ
π Read
via "National Vulnerability Database".
The Visitor Traffic Real Time Statistics WordPress plugin before 3.9 does not validate and escape user input passed to the today_traffic_index AJAX action (available to any authenticated users) before using it in a SQL statement, leading to an SQL injection issueπ Read
via "National Vulnerability Database".
βΌ CVE-2021-24695 βΌ
π Read
via "National Vulnerability Database".
The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernamesπ Read
via "National Vulnerability Database".
βΌ CVE-2020-4160 βΌ
π Read
via "National Vulnerability Database".
IBM QRadar Network Security 5.4.0 and 5.5.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 174340.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4153 βΌ
π Read
via "National Vulnerability Database".
IBM QRadar Network Security 5.4.0 and 5.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174269.π Read
via "National Vulnerability Database".
β Zebra2104 Initial Access Broker Supports Rival Malware Gangs, APTs β
π Read
via "Threat Post".
Researchers have uncovered a large, tangled web of infrastructure being used to enable a wide variety of cyberattacks.π Read
via "Threat Post".
Threat Post
Zebra2104 Initial Access Broker Supports Rival Malware Gangs, APTs
Researchers have uncovered a large, tangled web of infrastructure being used to enable a wide variety of cyberattacks.
π΄ What My Optometrist Taught Me About InfoSec Presentations π΄
π Read
via "Dark Reading".
A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience.π Read
via "Dark Reading".
Dark Reading
What My Optometrist Taught Me About InfoSec Presentations
A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience.
β DDoS Attacks Shatter Records in Q3, Report Finds β
π Read
via "Threat Post".
Q3 DDoS attacks topped thousands daily, with more growth expected.π Read
via "Threat Post".
Threat Post
DDoS Attacks Shatter Records in Q3, Report Finds
Q3 DDoS attacks topped thousands daily, with more growth expected.
π΄ Investor Group to Acquire McAfee for $14B π΄
π Read
via "Dark Reading".
The group, made up of Advent, Permira, Crosspoint Capital, CPP Investments, GIC, and ADIA, will take ownership of McAfee.π Read
via "Dark Reading".
Dark Reading
Investor Group to Acquire McAfee for $14B
The group, made up of Advent, Permira, Crosspoint Capital, CPP Investments, GIC, and ADIA, will take ownership of McAfee.
βΌ CVE-2021-39420 βΌ
π Read
via "National Vulnerability Database".
Multiple Cross Site Scripting (XSS) vulnerabilities exist in VFront 0.99.5 via the (1) s parameter in search_all.php and the (2) msg parameter in add.attach.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41170 βΌ
π Read
via "National Vulnerability Database".
### Impact Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. ### Patches Version 1.1.1 has addressed this vulnerability. ```php $params = [ 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1 'value' => 'My website' ] TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated) Template::embrace('<h1>{{reverse(value)}}</h1>', $params); ``` ### Workarounds Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. ### References As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)π Read
via "National Vulnerability Database".
π΄ What Security Strategies Are Driving InfoSec's Decisions Around Defense? π΄
π Read
via "Dark Reading".
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.π Read
via "Dark Reading".
Dark Reading
What Security Strategies Are Driving InfoSec's Decisions Around Defense?
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.
β Kaseya ransomware suspect nabbed in Poland, $6m seized from absent colleague β
π Read
via "Naked Security".
Suspects nabbed, millions seized, in ransomware busts across the globe.π Read
via "Naked Security".
Naked Security
Kaseya ransomware suspect nabbed in Poland, $6m seized from absent colleague
Suspects nabbed, millions seized, in ransomware busts across the globe.
π¦Ώ Europol arrests three suspects possibly involved in major ransomware activities π¦Ώ
π Read
via "Tech Republic".
Europol announced new arrests during its "Operation GoldDust." The suspects may have been heavily involved in the Sodinokibi/REvil and GandCrab ransomware activities.π Read
via "Tech Republic".
TechRepublic
Europol arrests three suspects possibly involved in major ransomware activities
Europol announced new arrests during its "Operation GoldDust." The suspects may have been heavily involved in the Sodinokibi/REvil and GandCrab ransomware activities.
βΌ CVE-2021-41253 βΌ
π Read
via "National Vulnerability Database".
Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23572 βΌ
π Read
via "National Vulnerability Database".
BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40260 βΌ
π Read
via "National Vulnerability Database".
Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester Tailor Management 1.0 via the (1) eid parameter in (a) partedit.php and (b) customeredit.php, the (2) id parameter in (a) editmeasurement.php and (b) addpayment.php, and the (3) error parameter in index.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40261 βΌ
π Read
via "National Vulnerability Database".
Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester CASAP Automated Enrollment System 1.0 via the (1) user_username and (2) category parameters in save_class.php, the (3) firstname, (4) class, and (5) status parameters in student_table.php, the (6) category and (7) class_name parameters in add_class1.php, the (8) fname, (9) mname,(10) lname, (11) address, (12) class, (13) gfname, (14) gmname, (15) glname, (16) rship, (17) status, (18) transport, and (19) route parameters in add_student.php, the (20) fname, (21) mname, (22) lname, (23) address, (24) class, (25) fgname, (26) gmname, (27) glname, (28) rship, (29) status, (30) transport, and (31) route parameters in save_stud.php,the (32) status, (33) fname, and (34) lname parameters in add_user.php, the (35) username, (36) firstname, and (37) status parameters in users.php, the (38) fname, (39) lname, and (40) status parameters in save_user.php, and the (41) activity_log, (42) aprjun, (43) class, (44) janmar, (45) Julsep,(46) octdec, (47) Students and (48) users parameters in table_name.π Read
via "National Vulnerability Database".
π΄ US Charges Ukrainian National for Kaseya Ransomware Attack π΄
π Read
via "Dark Reading".
Yaroslav Vasinskyi is one of seven individuals believed to be responsible for deploying REvil ransomware in attacks against 5,000 organizations.π Read
via "Dark Reading".
Dark Reading
US Charges Ukrainian National for Kaseya Ransomware Attack
Yaroslav Vasinskyi is one of seven individuals believed to be responsible for deploying REvil ransomware in attacks against 5,000 organizations.
π΄ UL Launches SafeCyber Platform to Secure IoT π΄
π Read
via "Dark Reading".
ULβs SafeCyber will allow organizations to manage cybersecurity governance and processes as well as speed up time spent on firmware development.π Read
via "Dark Reading".
Dark Reading
UL Launches SafeCyber Platform to Secure IoT
ULβs SafeCyber will allow organizations to manage cybersecurity governance and processes as well as speed up time spent on firmware development.
β REvil Affiliates Arrested; DOJ Seizes $6.1M in Ransom β
π Read
via "Threat Post".
The U.S. is seeking the extradition of a Ukrainian man, Yaroslav Vasinskyi, whom they suspect is behind the Kaseya supply-chain attacks and other REvil attacks.π Read
via "Threat Post".
Threat Post
REvil Affiliates Arrested; DOJ Seizes $6.1M in Ransom
International law enforcement is squeezing REvil affiliates out of hiding, but the underground is shrugging it off: They know that Russia wonβt touch a hair on the heads of the Russian ransomware operators, experts say. On Monday, Europol announced the arrestβ¦