πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-42558 β€Ό

An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23109 β€Ό

Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20615 β€Ό

Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23108 β€Ό

Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21675 β€Ό

Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA "Zip Slip"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victimΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s machine. The impact of a Zip Slip vulnerability would allow an attacker to create or overwrite existing files on the filesystem. In the context of a web application, a web shell could be placed within the application directory to achieve code execution. All users should upgrade to BCV v2.11.0 when possible to receive a patch. There are no recommended workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20613 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23113 β€Ό

Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20618 β€Ό

A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36417 β€Ό

A heap-based buffer overflow vulnerability exists in GPAC v1.0.1 in the gf_isom_dovi_config_get function in MP4Box, which causes a denial of service or execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42559 β€Ό

An issue was discovered in CALDERA 2.8.1. It contains multiple startup "requirements" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23106 β€Ό

Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43960 β€Ό

** DISPUTED ** Lorensbergs Connect2 3.13.7647.20190 is affected by an XSS vulnerability. Exploitation requires administrator privileges and is performed through the Wizard editor of the application. The attack requires an administrator to go into the Wizard editor and enter an XSS payload within the Page title, Page Instructions, Text before, Text after, or Text on side box. Once this has been done, the administrator must click save and finally wait until any user of the application performs a booking for rental items in the booking area of the application, where the XSS triggers. NOTE: another perspective is that the administrator may require JavaScript to customize any aspect of the page rendering. There is no effective way for the product to defend users in the face of a malicious administrator.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23112 β€Ό

A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23107 β€Ό

Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23110 β€Ό

Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42560 β€Ό

An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45449 β€Ό

Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the userÒ€ℒs local files.

πŸ“– Read

via "National Vulnerability Database".
❌ Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft ❌

Most Windows versions are at risk of remote, unprivileged attackers abusing RDP from the inside to hijack smart cards and get unauthorized file system access.

πŸ“– Read

via "Threat Post".
❌ Amazon, Azure Clouds Host RAT-ty Trio in Infostealing Campaign ❌

A cloudy campaign delivers commodity remote-access trojans to steal information and execute code.

πŸ“– Read

via "Threat Post".
πŸ•΄ New Research Reveals Public-Sector IAM Weaknesses and Priorities πŸ•΄

Auth0 Public Sector Index shows that governments are struggling to provide trustworthy online citizen services.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Oxeye Introduce Open Source Payload Deobfuscation Tool πŸ•΄

Ox4Shell exposes hidden payloads thatare actively being used to confuse security protection tools and security teams.

πŸ“– Read

via "Dark Reading".