🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2021-4083

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

📖 Read

via "National Vulnerability Database".
CVE-2022-0151

An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not correctly handling requests to delete existing packages which could result in a Denial of Service under specific conditions.

📖 Read

via "National Vulnerability Database".
CVE-2022-0210

The Random Banner WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the category parameter found in the ~/include/models/model.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 4.1.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

📖 Read

via "National Vulnerability Database".
CVE-2022-22690

Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover.

📖 Read

via "National Vulnerability Database".
CVE-2022-22691

The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.

📖 Read

via "National Vulnerability Database".
CVE-2021-43353

The Crisp Live Chat WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the crisp_plugin_settings_page function found in the ~/crisp.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 0.31.

📖 Read

via "National Vulnerability Database".
CVE-2022-0244

An issue has been discovered in GitLab CE/EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group was due to incorrect handling of file.

📖 Read

via "National Vulnerability Database".
Cybercriminals Actively Target VMware vSphere with Cryptominers

VMware's container-based application development environment has become attractive to cyberattackers.

📖 Read

via "Threat Post".
🕴 Europol Shuts Down Popular Cybercriminal VPN Service 🕴

VPNLab was used to support criminal activity, including ransomware campaigns and other attacks, Europol officials report.

📖 Read

via "Dark Reading".
🦿 5 tools helping companies more effectively manage cybersecurity in 2022 🦿

As more companies focus on digital adoption goals in 2022, finding security tools to detect malicious activity is top-of-mind for executives.

📖 Read

via "Tech Republic".
The Log4j Vulnerability Puts Pressure on the Security World

It's time to sound the alarm for Log4Shell. Saryu Nayyar, CEO at Gurucul, discusses what actions you should be taking.

📖 Read

via "Threat Post".
🕴 Kovrr Translates Cyber Risk into Business Impact with its Quantum Platform 🕴

On-demand cyber risk quantification platform enables C-suite to prioritize and justify cybersecurity investments through financial quantification.

📖 Read

via "Dark Reading".
CVE-2021-44840

An issue was discovered in Delta RM 1.2. Using an privileged account, it is possible to edit, create, and delete risk labels, such as Criticality and Priority Indication labels. By using the /core/table/query endpoint, and by using a POST request and indicating the affected label with tableUid parameter and the operation with datas[query], it is possible to edit, create, and delete the following labels: Priority Indication, Quality Evaluation, Progress Margin and Priority. Furthermore, it is also possible to export Criticality labels with an unprivileged user.

📖 Read

via "National Vulnerability Database".
CVE-2021-44836

An issue was discovered in Delta RM 1.2. The /risque/risque/workflow/reset endpoint is lacking access controls, and it is possible for an unprivileged user to reopen a risk with a POST request, using the risqueID parameter to identify the risk to be re-opened.

📖 Read

via "National Vulnerability Database".
CVE-2021-44838

An issue was discovered in Delta RM 1.2. Using the /risque/risque/ajax-details endpoint, with a POST request indicating the risk to access with the id parameter, it is possible for users to access risks of other companies.

📖 Read

via "National Vulnerability Database".
CVE-2021-44839

An issue was discovered in Delta RM 1.2. It is possible to request a new password for any other account using the account ID. Using the /listes/DTsendmaildata/adm_utilisateur/send-mail.json endpoint, a user can send a JSON array with user IDs that will have their passwords reset (and new ones sent to their respective e-mail addresses).

📖 Read

via "National Vulnerability Database".
CVE-2022-21696

OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.

📖 Read

via "National Vulnerability Database".
🕴 Kaspersky Announces Takedown Service 🕴

Service facilitates the removal of malicious and phishing domains.

📖 Read

via "Dark Reading".
🕴 Take 'Urgent' Steps to Secure Systems From Damaging Attacks, CISA Says 🕴

CISA issues alert for senior leadership of US organizations amid rising tensions between Russia and Ukraine.

📖 Read

via "Dark Reading".
🕴 End Users Remain Organizations' Biggest Security Risk 🕴

Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.

📖 Read

via "Dark Reading".
Will 2022 Be the Year of the Software Bill of Materials?

Praise be & pass the recipe for the software soup: There's too much scrambling to untangle vulnerabilities and dependencies, say a security experts roundtable.

📖 Read

via "Threat Post".