🕴 US Military Has Acted Against Ransomware Groups: Report 🕴
📖 Read
via "Dark Reading".
Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups.📖 Read
via "Dark Reading".
Dark Reading
US Military Has Acted Against Ransomware Groups: Report
Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups.
‼ CVE-2021-43800 ‼
📖 Read
via "National Vulnerability Database".
Wiki.js is a wiki app built on Node.js. Prior to version 2.5.254, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled on a Windows host. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory traversal. This is only possible on a Wiki.js server running on Windows, when a storage module implementing local asset cache (e.g Local File System or Git) is enabled and that no web application firewall solution (e.g. cloudflare) strips potentially malicious URLs. Commit number 414033de9dff66a327e3f3243234852f468a9d85 fixes this vulnerability by sanitizing the path before it is passed on to the storage module. The sanitization step removes any windows directory traversal sequences from the path. As a workaround, disable any storage module with local asset caching capabilities (Local File System, Git).📖 Read
via "National Vulnerability Database".
❌ Crypto-Exchange BitMart to Pay Users for $200M Theft ❌
📖 Read
via "Threat Post".
BitMart confirmed it had been drained of ~$150 million in cryptocurrency assets, but a blockchain security firm said it's closer to $200 million.📖 Read
via "Threat Post".
Threat Post
Crypto-Exchange BitMart to Pay Users for $200M Theft
BitMart confirmed it had been drained of ~$150 million in cryptocurrency assets, but a blockchain security firm said it's closer to $200 million.
🕴 Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group 🕴
📖 Read
via "Dark Reading".
The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016.📖 Read
via "Dark Reading".
Dark Reading
Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group
The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016.
‼ CVE-2021-31632 ‼
📖 Read
via "National Vulnerability Database".
b2evolution CMS v7.2.3 was discovered to contain a SQL injection vulnerability via the parameter cfqueryparam in the User login section. This vulnerability allows attackers to execute arbitrary code via a crafted input.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44678 ‼
📖 Read
via "National Vulnerability Database".
An issue (2 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14076).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40091 ‼
📖 Read
via "National Vulnerability Database".
An SSRF issue was discovered in SquaredUp for SCOM 5.2.1.6654.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-31631 ‼
📖 Read
via "National Vulnerability Database".
b2evolution CMS v7.2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the User login page. This vulnerability allows attackers to escalate privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36564 ‼
📖 Read
via "National Vulnerability Database".
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36567 ‼
📖 Read
via "National Vulnerability Database".
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44682 ‼
📖 Read
via "National Vulnerability Database".
An issue (6 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14079).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44677 ‼
📖 Read
via "National Vulnerability Database".
An issue (1 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14078).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-37298 ‼
📖 Read
via "National Vulnerability Database".
Laravel v5.1 was discovered to contain a deserialization vulnerability via the component \Mockery\Generator\DefinedTargetClass.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44681 ‼
📖 Read
via "National Vulnerability Database".
An issue (5 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14080).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4075 ‼
📖 Read
via "National Vulnerability Database".
snipe-it is vulnerable to Server-Side Request Forgery (SSRF)📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40313 ‼
📖 Read
via "National Vulnerability Database".
Piwigo v11.5 was discovered to contain a SQL injection vulnerability via the parameter pwg_token in /admin/batch_manager_global.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44679 ‼
📖 Read
via "National Vulnerability Database".
An issue (3 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14074).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44680 ‼
📖 Read
via "National Vulnerability Database".
An issue (4 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14075).📖 Read
via "National Vulnerability Database".
🕴 MITRE Engenuity & Cybrary Surpass 25,000 Users in MITRE ATT&CK Defender Certification Program 🕴
📖 Read
via "Dark Reading".
The program helps close the skill gap to enable defenders to gain the advantage over cyber adversaries.📖 Read
via "Dark Reading".
Dark Reading
MITRE Engenuity & Cybrary Surpass 25,000 Users in MITRE ATT&CK Defender Certification Program
The program helps close the skill gap to enable defenders to gain the advantage over cyber adversaries.
‼ CVE-2021-44684 ‼
📖 Read
via "National Vulnerability Database".
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44685 ‼
📖 Read
via "National Vulnerability Database".
Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution).📖 Read
via "National Vulnerability Database".