βΌ CVE-2021-42558 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in CALDERA 2.8.1. It contains multiple reflected, stored, and self XSS vulnerabilities that may be exploited by authenticated and unauthenticated attackers.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23109 βΌ
π Read
via "National Vulnerability Database".
Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20615 βΌ
π Read
via "National Vulnerability Database".
Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23108 βΌ
π Read
via "National Vulnerability Database".
Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21675 βΌ
π Read
via "National Vulnerability Database".
Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA "Zip Slip"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victimΓΒ’Γ’β¬ÒβΒ’s machine. The impact of a Zip Slip vulnerability would allow an attacker to create or overwrite existing files on the filesystem. In the context of a web application, a web shell could be placed within the application directory to achieve code execution. All users should upgrade to BCV v2.11.0 when possible to receive a patch. There are no recommended workarounds aside from upgrading.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20613 βΌ
π Read
via "National Vulnerability Database".
A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23113 βΌ
π Read
via "National Vulnerability Database".
Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20618 βΌ
π Read
via "National Vulnerability Database".
A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36417 βΌ
π Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability exists in GPAC v1.0.1 in the gf_isom_dovi_config_get function in MP4Box, which causes a denial of service or execute arbitrary code via a crafted file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42559 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in CALDERA 2.8.1. It contains multiple startup "requirements" that execute commands when starting the server. Because these commands can be changed via the REST API, an authenticated user can insert arbitrary commands that will execute when the server is restarted.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23106 βΌ
π Read
via "National Vulnerability Database".
Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43960 βΌ
π Read
via "National Vulnerability Database".
** DISPUTED ** Lorensbergs Connect2 3.13.7647.20190 is affected by an XSS vulnerability. Exploitation requires administrator privileges and is performed through the Wizard editor of the application. The attack requires an administrator to go into the Wizard editor and enter an XSS payload within the Page title, Page Instructions, Text before, Text after, or Text on side box. Once this has been done, the administrator must click save and finally wait until any user of the application performs a booking for rental items in the booking area of the application, where the XSS triggers. NOTE: another perspective is that the administrator may require JavaScript to customize any aspect of the page rendering. There is no effective way for the product to defend users in the face of a malicious administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23112 βΌ
π Read
via "National Vulnerability Database".
A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23107 βΌ
π Read
via "National Vulnerability Database".
Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23110 βΌ
π Read
via "National Vulnerability Database".
Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42560 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.).π Read
via "National Vulnerability Database".
βΌ CVE-2021-45449 βΌ
π Read
via "National Vulnerability Database".
Docker Desktop version 4.3.0 and 4.3.1 has a bug that may log sensitive information (access token or password) on the user's machine during login. This only affects users if they are on Docker Desktop 4.3.0, 4.3.1 and the user has logged in while on 4.3.0, 4.3.1. Gaining access to this data would require having access to the userΓ’β¬β’s local files.π Read
via "National Vulnerability Database".
β Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft β
π Read
via "Threat Post".
Most Windows versions are at risk of remote, unprivileged attackers abusing RDP from the inside to hijack smart cards and get unauthorized file system access.π Read
via "Threat Post".
Threat Post
Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft
Most Windows versions are at risk of remote, unprivileged attackers abusing RDP from the inside to hijack smart cards and get unauthorized file system access.
β Amazon, Azure Clouds Host RAT-ty Trio in Infostealing Campaign β
π Read
via "Threat Post".
A cloudy campaign delivers commodity remote-access trojans to steal information and execute code.π Read
via "Threat Post".
Threat Post
Amazon, Azure Clouds Host RAT-ty Trio in Infostealing Campaign
A cloudy campaign delivers commodity remote-access trojans to steal information and execute code.
π΄ New Research Reveals Public-Sector IAM Weaknesses and Priorities π΄
π Read
via "Dark Reading".
Auth0 Public Sector Index shows that governments are struggling to provide trustworthy online citizen services.π Read
via "Dark Reading".
Dark Reading
New Research Reveals Public-Sector IAM Weaknesses and Priorities
Auth0 Public Sector Index shows that governments are struggling to provide trustworthy online citizen services.
π΄ Oxeye Introduce Open Source Payload Deobfuscation Tool π΄
π Read
via "Dark Reading".
Ox4Shell exposes hidden payloads thatare actively being used to confuse security protection tools and security teams.π Read
via "Dark Reading".
Dark Reading
Oxeye Introduce Open Source Payload Deobfuscation Tool
Ox4Shell exposes hidden payloads thatare actively being used to confuse security protection tools and security teams.