πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Ubiquiti data breach orchestrated by β€œtrusted insider”, says DoJ πŸ“’

Software engineer Nickolas Sharp faces 37 years in prison for allegedly exploiting his access credentials to extort his employer

πŸ“– Read

via "ITPro".
πŸ“’ UK gov criticised after Β£5bn in Bounce Back Loans paid to fraudsters πŸ“’

A National Audit Office report has also branded plans to recover 0.1% of stolen funds "inadequate"

πŸ“– Read

via "ITPro".
β€Ό CVE-2021-44420 β€Ό

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43808 β€Ό

Laravel is a web application framework. Laravel prior to versions 8.75.0, 7.30.6, and 6.20.42 contain a possible cross-site scripting (XSS) vulnerability in the Blade templating engine. A broken HTML element may be clicked and the user taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched in versions 8.75.0, 7.30.6, and 6.20.42 by determining the parent placeholder at runtime and using a random hash that is unique to each request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20047 β€Ό

SonicWall Global VPN client version 4.10.6 (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability. Successful exploitation via a local attacker could result in remote code execution in the target system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20038 β€Ό

A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20040 β€Ό

A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20044 β€Ό

A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20039 β€Ό

Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20043 β€Ό

A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20045 β€Ό

A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20041 β€Ό

An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20042 β€Ό

An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

πŸ“– Read

via "National Vulnerability Database".
❌ Emotet’s Behavior & Spread Are Omens of Ransomware Attacks ❌

The botnet, which resurfaced last month on the back of TrickBot, can now directly install Cobalt Strike on infected devices, giving threat actors direct access to targets.

πŸ“– Read

via "Threat Post".
πŸ•΄ 5 Tips to Stay on the Offensive and Safeguard Your Attack Surface πŸ•΄

New, global-scale attacks aren't a security problem; they're a big data problem requiring a data-led solution.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43064 β€Ό

A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43063 β€Ό

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41014 β€Ό

A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows an unauthenticated attacker to make the httpsd daemon unresponsive via huge HTTP packets

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36191 β€Ό

A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to use the device as proxy via crafted GET parameters in requests to error handlers

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41015 β€Ό

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to SAML login handler

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41024 β€Ό

A relative path traversal [CWE-23] vulnerabiltiy in FortiOS versions 7.0.0 and 7.0.1 and FortiProxy verison 7.0.0 may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page.

πŸ“– Read

via "National Vulnerability Database".