‼ CVE-2021-24943 ‼
📖 Read
via "National Vulnerability Database".
The Registrations for the Events Calendar WordPress plugin before 2.7.6 does not sanitise and escape the event_id in the rtec_send_unregister_link AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL injection.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24935 ‼
📖 Read
via "National Vulnerability Database".
The WP Google Fonts WordPress plugin before 3.1.5 does not escape the googlefont_ajax_name and googlefont_ajax_family parameter of the googlefont_action AJAx action (available to any authenticated user) before outputing them in attributes, leading Reflected Cross-Site Scripting issues📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24914 ‼
📖 Read
via "National Vulnerability Database".
The Tawk.To Live Chat WordPress plugin before 0.6.0 does not have capability and CSRF checks in the tawkto_setwidget and tawkto_removewidget AJAX actions, available to any authenticated user. The first one allows low-privileged users (including simple subscribers) to change the 'tawkto-embed-widget-page-id' and 'tawkto-embed-widget-widget-id' parameters. Any authenticated user can thus link the vulnerable website to their own Tawk.to instance. Consequently, they will be able to monitor the vulnerable website and interact with its visitors (receive contact messages, answer, ...). They will also be able to display an arbitrary Knowledge Base. The second one will remove the live chat widget from pages.📖 Read
via "National Vulnerability Database".
🦿 How to write YARA rules for improving your security and malware detection 🦿
📖 Read
via "Tech Republic".
YARA won't replace antivirus software, but it can help you detect problems more efficiently and allows more customization. Learn how to write YARA rules to improve security and incident response .📖 Read
via "Tech Republic".
TechRepublic
How to write YARA rules for improving your security and malware detection
YARA won't replace antivirus software, but it can help you detect problems more efficiently and allows more customization. Learn how to write YARA rules to improve security and incident response.
❌ Cuba Ransomware Gang Hauls in $44M in Payouts ❌
📖 Read
via "Threat Post".
The gang is using a variety of tools and malware to carry out attacks in volume on critical sectors, the FBI warned.📖 Read
via "Threat Post".
Threat Post
‘Cuba’ Ransomware Gang Hauls in $44M in Payouts
The gang is using a variety of tools and malware to carry out attacks in volume on critical sectors, the FBI warned.
‼ CVE-2021-43936 ‼
📖 Read
via "National Vulnerability Database".
The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35242 ‼
📖 Read
via "National Vulnerability Database".
Serv-U server responds with valid CSRFToken when the request contains only Session.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36198 ‼
📖 Read
via "National Vulnerability Database".
Successful exploitation of this vulnerability could allow an unauthorized user to access sensitive data.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-43781 ‼
📖 Read
via "National Vulnerability Database".
Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35245 ‼
📖 Read
via "National Vulnerability Database".
When a user has admin rights in Serv-U Console, the user can move, create and delete any files are able to be accessed on the Serv-U host machine.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-22170 ‼
📖 Read
via "National Vulnerability Database".
Assuming a database breach, nonce reuse issues in GitLab 11.6+ allows an attacker to decrypt some of the database's encrypted content📖 Read
via "National Vulnerability Database".
‼ CVE-2021-43931 ‼
📖 Read
via "National Vulnerability Database".
The authentication algorithm of the WebHMI portal is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39890 ‼
📖 Read
via "National Vulnerability Database".
It was possible to bypass 2FA for LDAP users and access some specific pages with Basic Authentication in GitLab 14.1.1 and above.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-43784 ‼
📖 Read
via "National Vulnerability Database".
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.📖 Read
via "National Vulnerability Database".
🔏 U.S. Railroad Operators Must Disclose Cybersecurity Incidents Within 24 Hours 🔏
📖 Read
via "".
Last week, the Transportation Security Administration continued its 60-day sprint around securing high-risk transit systems by mandating railroad owners disclose cybersecurity incidents within 24 hours.📖 Read
via "".
Digital Guardian
U.S. Railroad Operators Must Disclose Cybersecurity Incidents Within 24 Hours
Last week, the Transportation Security Administration continued its 60-day sprint around securing high-risk transit systems by mandating railroad owners disclose cybersecurity incidents within 24 hours.
❌ Cyber Command Publicly Joins Fight Against Ransomware Groups ❌
📖 Read
via "Threat Post".
U.S. military acknowledges targeting cybercriminals who launch attacks on U.S. companies.📖 Read
via "Threat Post".
Threat Post
Cyber Command Publicly Joins Fight Against Ransomware Groups
U.S. military acknowledges targeting cybercriminals who launch attacks on U.S. companies.
🕴 Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets 🕴
📖 Read
via "Dark Reading".
Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say.📖 Read
via "Dark Reading".
Dark Reading
Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets
Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say.
🕴 US Military Has Acted Against Ransomware Groups: Report 🕴
📖 Read
via "Dark Reading".
Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups.📖 Read
via "Dark Reading".
Dark Reading
US Military Has Acted Against Ransomware Groups: Report
Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups.
‼ CVE-2021-43800 ‼
📖 Read
via "National Vulnerability Database".
Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory traversal. This is only possible on a Wiki.js server running on Windows, when a storage module implementing local asset cache (e.g Local File System or Git) is enabled and that no web application firewall solution (e.g. cloudflare) strips potentially malicious URLs. Commit number 414033de9dff66a327e3f3243234852f468a9d85 fixes this vulnerability by sanitizing the path before it is passed on to the storage module. The sanitization step removes any windows directory traversal sequences from the path. As a workaround, disable any storage module with local asset caching capabilities (Local File System, Git).📖 Read
via "National Vulnerability Database".
❌ Crypto-Exchange BitMart to Pay Users for $200M Theft ❌
📖 Read
via "Threat Post".
BitMart confirmed it had been drained of ~$150 million in cryptocurrency assets, but a blockchain security firm said it's closer to $200 million.📖 Read
via "Threat Post".
Threat Post
Crypto-Exchange BitMart to Pay Users for $200M Theft
BitMart confirmed it had been drained of ~$150 million in cryptocurrency assets, but a blockchain security firm said it's closer to $200 million.
🕴 Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group 🕴
📖 Read
via "Dark Reading".
The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016.📖 Read
via "Dark Reading".
Dark Reading
Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group
The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016.