🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-24236 ‼

An insecure permissions vulnerability in Snapt Aria v12.8 allows unauthenticated attackers to send e-mails from spoofed users' accounts.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-24766 ‼

mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless mitmproxy is used to protect an HTTP/1 service, no action is required. The vulnerability has been fixed in mitmproxy 8.0.0 and above. There are currently no known workarounds.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-0694 ‼

The Advanced Booking Calendar WordPress plugin before 1.7.0 does not validate and escape the calendar parameter before using it in a SQL statement via the abc_booking_getSingleCalendar AJAX action (available to both unauthenticated and authenticated users), leading to an unauthenticated SQL injection

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-0747 ‼

The Infographic Maker WordPress plugin before 4.3.8 does not validate and escape the post_id parameter before using it in a SQL statement via the qcld_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-0514 ‼

Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-0760 ‼

The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-0229 ‼

The miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-25019 ‼

The SEO Plugin by Squirrly SEO WordPress plugin before 11.1.12 does not escape the type parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-24775 ‼

guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-24905 ‼

The Advanced Contact form 7 DB WordPress plugin before 1.8.7 does not have authorisation nor CSRF checks in the acf7_db_edit_scr_file_delete AJAX action, and does not validate the file to be deleted, allowing any authenticated user to delete arbitrary files on the web server. For example, removing the wp-config.php allows attackers to trigger WordPress setup again, gain administrator privileges and execute arbitrary code or display arbitrary content to the users.

📖 Read

via "National Vulnerability Database".
🕴 White House Warns of New Intel on Russia Mulling Cyberattack 'Options' Against US 🕴

Biden administration doubles down on its previous warnings of possible Russian cyberattacks in the wake of hefty economic sanctions imposed on Russia by the US.

📖 Read

via "Dark Reading".
🕴 'Unique Attack Chain' Drops Backdoor in New Phishing Campaign 🕴

A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.

📖 Read

via "Dark Reading".
‼ CVE-2022-23347 ‼

BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23352 ‼

An issue in BigAnt Software BigAnt Server v5.6.06 can lead to a Denial of Service (DoS).

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-26148 ‼

An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23345 ‼

BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23349 ‼

BigAnt Software BigAnt Server v5.6.06 was discovered to contain a Cross-Site Request Forgery (CSRF).

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23350 ‼

BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23346 ‼

BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control issues.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23348 ‼

BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38745 ‼

Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.

📖 Read

via "National Vulnerability Database".