πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ No Critical Bugs for Microsoft February 2022 Patch Tuesday, 1 Zero-Day ❌

This batch had zero critical CVEs, which is unheard of. Most (50) of the patches are labeled Important, so don't delay to apply the patches, security experts said.

πŸ“– Read

via "Threat Post".
πŸ•΄ Get Started on Continuous Compliance Ahead of PCI DSS v4.0 πŸ•΄

Here's what vendors can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Threat Actors Revive 20-Year-Old Tactic in Microsoft 365 Phishing Attacks πŸ•΄

Recent attacks involving so-called "right-to-left override" spoofing aimed at Microsoft 365 users show how attackers sometimes modify and improve old methods to try and stay one step ahead of defenders.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-21702 β€Ό

Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0139 β€Ό

Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Cuts User Account Compromises in Half With Simple Change πŸ•΄

The online tech giant auto-enabled two-step verification for more than 150 million users, throwing up steep hurdles against scammers and attackers.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2022-0522 β€Ό

Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21703 β€Ό

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0524 β€Ό

Business Logic Errors in Rubygems typo prior to 9.2.7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23626 β€Ό

m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0521 β€Ό

Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0518 β€Ό

Heap-based Buffer Overflow in NPM radare2.js prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21713 β€Ό

Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0519 β€Ό

Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0523 β€Ό

Expired Pointer Dereference in NPM radare2.js prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0520 β€Ό

Use After Free in NPM radare2.js prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Issues 51 CVEs for Patch Tuesday, None 'Critical' πŸ•΄

One publicly known flaw β€” an elevation-of-privilege bug in Windows Kernel β€” was included in the patches.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Microsoft Patch Tuesday, February 2022 Edition β™ŸοΈ

Microsoft today released software updates to plug security holes in its Windows operating systems and related software. This month's relatively light patch batch is refreshingly bereft of any zero-day threats, or even scary critical vulnerabilities. But it does fix four dozen flaws, including several that Microsoft says will likely soon be exploited by malware or malcontents.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2022-24676 β€Ό

update_code in Admin.php in HYBBS2 through 2.3.2 allows arbitrary file upload via a crafted ZIP archive.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45329 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23627 β€Ό

ArchiSteamFarm (ASF) is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code, introduced in version V5.2.2.2, the program didn't adequately verify effective access of the user sending proxy (i.e. `[Bots]`) commands. In particular, a proxy-like command sent to bot `A` targeting bot `B` has incorrectly verified user's access against bot `A` - instead of bot `B`, to which the command was originally designated. This in result allowed access to resources beyond those configured, being a security threat affecting confidentiality of other bot instances. A successful attack exploiting this bug requires a significant access granted explicitly by original owner of the ASF process prior to that, as attacker has to control at least a single bot in the process to make use of this inadequate access verification loophole. The issue is patched in ASF V5.2.2.5, V5.2.3.2 and future versions. Users are advised to update as soon as possible.

πŸ“– Read

via "National Vulnerability Database".