πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Microsoft Launches Purview Platform to Govern, Protect, and Manage Sensitive Data πŸ•΄

The rebranded Microsoft Purview platform integrates Microsoft 365 Compliance and Azure Purview, and adds new capabilities and products to help manage data no matter where it resides.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24858 β€Ό

next-auth v3 users before version 3.29.2 are impacted. next-auth version 4 users before version 4.3.2 are also impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your callbacks option. If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3100 β€Ό

The Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.1-12 didnÒ€ℒt mimic the permissions of the JVM being patched, allowing it to escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-0071 β€Ό

Incomplete fix for CVE-2021-3101. Hotdog, prior to v1.0.2, did not mimic the resource limits, device restrictions, or syscall filters of the target JVM process. This would allow a container to exhaust the resources of the host, modify devices, or make syscalls that would otherwise be blocked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3101 β€Ό

Hotdog, prior to v1.0.1, did not mimic the capabilities or the SELinux label of the target JVM process. This would allow a container to gain full privileges on the host, bypassing restrictions set on the container.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0070 β€Ό

Incomplete fix for CVE-2021-3100. The Apache Log4j hotpatch package starting with log4j-cve-2021-44228-hotpatch-1.1-16 will now explicitly mimic the Linux capabilities and cgroups of the target Java process that the hotpatch is applied to.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24860 β€Ό

Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Use of Hard-coded Cryptographic Key vulnerability. An attacker can use hard coding to generate login credentials of any user and log in to the service background located at different IP addresses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24826 β€Ό

On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`. The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds. (The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.) Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case. The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published. The problem was introduced in version 2.12.1 and is patched in version 3.1.3. Users of affected versions should upgrade to version 3.1.3. There are currently no known workarounds at this time.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-27629 β€Ό

Cross-site request forgery (CSRF) vulnerability in 'MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership' versions prior to 1.9.6 allows a remote unauthenticated attacker to hijack the authentication of an administrator and perform unintended operation via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
❌ Google: 2021 was a Banner Year for Exploited 0-Day Bugs ❌

Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes.

πŸ“– Read

via "Threat Post".
πŸ•΄ Fortress Tackles Supply Chain Security, One Asset at a Time πŸ•΄

Fortress Information Security will expand its Asset to Vendor Library to include hardware bill of materials and software bill of materials information.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ UK government employees receive β€˜billions’ of malicious emails per year – report πŸ—“οΈ

Phishing, malware, and spam are popular techniques deployed by attackers

πŸ“– Read

via "The Daily Swig".
πŸ•΄ From Passive Recovery to Active Readiness πŸ•΄

This is the shift that companies need to make after a cyberattack.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1254 β€Ό

A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25344 β€Ό

An XSS issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application doesn't properly check parameters, sent in a /dvcset/sysset/set.cgi POST request via the arg01.Hostname field, before saving them on the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25343 β€Ό

An issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Denial of Service. An unauthenticated attacker, who can send POST requests to the /download/set.cgi page by manipulating the failhtmfile variable, is able to cause interruption of the service provided by the Web Application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25342 β€Ό

An issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Broken Access Control. It does not properly validate requests for access to data and functionality under the /mngset/authset path. By not verifying permissions for access to resources, it allows a potential attacker to view pages that are not allowed.

πŸ“– Read

via "National Vulnerability Database".
⚠ Beanstalk cryptocurrency heist: scammer votes himself all the money ⚠

Voting safeguards based on commuity collateral don't work if one person can use a momentary loan to "become" 75% of the community.

πŸ“– Read

via "Naked Security".
πŸ•΄ Backward-Compatible Post-Quantum Communications Is a Matter of National Security πŸ•΄

When a quantum computer can decipher the asymmetric encryption protecting our vital systems, Q-Day will arrive.

πŸ“– Read

via "Dark Reading".
❌ Most Email Security Approaches Fail to Block Common Threats ❌

A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.

πŸ“– Read

via "Threat Post".
⚠ Critical cryptographic Java security blunder patched – update now! ⚠

Either know the private key and use it scrupulously in your digital signature calculation.... or just send a bunch of zeros instead.

πŸ“– Read

via "Naked Security".