πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-26944 β€Ό

Percona XtraBackup 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table. NOTE: this issue exists because of an incomplete fix for CVE-2020-10997.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38221 β€Ό

bbs-go <= 3.3.0 including Custom Edition is vulnerable to stored XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31023 β€Ό

Play Framework is a web framework for Java and Scala. Verions prior to 2.8.16 are vulnerable to generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application. In particular, the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value. This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior. A workaround is available. When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that the application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29597 β€Ό

Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to Local File Inclusion (LFI). Any authenticated user has the ability to reference internal system files within requests made to the RRSWeb/maint/ShowDocument/ShowDocument.aspx page. The server will successfully respond with the file contents of the internal system file requested. This ability could allow for adversaries to extract sensitive data and/or files from the underlying file system, gain knowledge about the internal workings of the system, or access source code of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45981 β€Ό

NetScout nGeniusONE 6.3.2 allows an XML External Entity (XXE) attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31024 β€Ό

richdocuments is the repository for NextCloud Collabra, the app for Nextcloud Office collaboration. Prior to versions 6.0.0, 5.0.4, and 4.2.6, a user could be tricked into working against a remote Office by sending them a federated share. richdocuments versions 6.0.0, 5.0.4 and 4.2.6 contain a fix for this issue. There are currently no known workarounds available.

πŸ“– Read

via "National Vulnerability Database".
⚠ Yet another zero-day (sort of) in Windows β€œsearch URL” handling ⚠

More trouble with special-purpose URLs on Windows.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep85: Now THAT’S what I call a Microsoft Office exploit! [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Gurucul Launches Cloud-Native SOC Platform Pushing the Boundaries of Next-Gen SIEM and XDR with Identity Threat Detection and Response πŸ•΄

Gurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a flexible enterprise risk engine for hybrid and multi-cloud environments.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Research Reveals 75% of CISOs Are Worried Too Many Application Vulnerabilities Leak Into Production, Despite a Multi-Layered Security Approach πŸ•΄

79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern multi-cloud environments.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Intel Chipset Firmware Actively Targeted by Conti Group πŸ•΄

Conti threat actors are betting chipset firmware is updated less frequently than other software β€” and winning big, analysts say.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cerberus Sentinel Completes Acquisition of Creatrix, Inc. πŸ•΄

U.S. cybersecurity services firm expands security and identity management services with woman-owned business.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22556 β€Ό

Dell PowerStore contains an Uncontrolled Resource Consumption Vulnerability in PowerStore User Interface. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26867 β€Ό

PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33473 β€Ό

An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26869 β€Ό

Dell PowerStore versions 2.0.0.x, 2.0.1.x and 2.1.0.x contains an open port vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure and arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26868 β€Ό

Dell EMC PowerStore versions 2.0.0.x, 2.0.1.x, and 2.1.0.x are vulnerable to a command injection flaw. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system takeover by an attacker.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29718 β€Ό

Caddy v2.4 was discovered to contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22557 β€Ό

PowerStore contains Plain-Text Password Storage Vulnerability in PowerStore X & T environments running versions 2.0.0.x and 2.0.1.x A locally authenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32250 β€Ό

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26866 β€Ό

Dell PowerStore Versions before v2.1.1.0. contains a Stored Cross-Site Scripting vulnerability. A high privileged network attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

πŸ“– Read

via "National Vulnerability Database".