πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How Poor Communication Opens the Door to Ransomware and Extortion πŸ•΄

Organizations can no longer rely on traditional responses to ransomware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-31026 β€Ό

Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1.1 This issue can be avoided by only connecting to trusted servers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31019 β€Ό

Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d "array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40668 β€Ό

The Android application HTTP File Server (Version 1.4.1) by 'slowscript' is affected by a path traversal vulnerability that permits arbitrary directory listing, file read, and file write.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40610 β€Ό

Emlog Pro v 1.0.4 cross-site scripting (XSS) in Emlog Pro background management.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31027 β€Ό

OAuthenticator is an OAuth token library for the JupyerHub login handler. CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. The patch fixing this issue makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 37 Major Companies and Organizations Pledge to Enhance Cyber Resiliency and Counter Evolving Global Threats πŸ•΄



πŸ“– Read

via "Dark Reading".
πŸ•΄ ReliaQuest Bolsters Extended Detection With Threat Intelligence πŸ•΄

ReliaQuest CTO Joe Partlow joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss extended detection response β€” and acquisition news.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Chinese cyber threat actors are widely abusing well-known attacks to infiltrate networks, CISA warns πŸ—“οΈ

APTs hammering unpatched vulnerabilities

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Formidable developer fights back against β€˜critical’ CVE vulnerability assignment πŸ—“οΈ

β€˜This false accusation messed up the release of one of our services,’ maintainer laments

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Automox Adds Automation to Patching, Vuln Management πŸ•΄

Automox's Paul Zimski joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about automated patch management.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why AIs Will Become Hackers πŸ•΄

At a 2022 RSA Conference keynote, technologist Bruce Schneier asserted that artificial intelligence agents will start to hack human systems β€” and what that will mean for us.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Uptycs: Observability Is Key to Cloud Security πŸ•΄

Uptycs' Ganesh Pai joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about cloud security and observability.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-31030 β€Ό

containerd is an open source container runtime. A bug was found in the containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd's CRI implementation; `ExecSync` may be used when running probes or when executing processes via an "exec" facility. This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1998 β€Ό

A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31390 β€Ό

Jizhicms v2.2.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Update function in app/admin/c/TemplateController.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31830 β€Ό

Kity Minder v1.3.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the init function at ImageCapture.class.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23138 β€Ό

ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31393 β€Ό

Jizhicms v2.2.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Index function in app/admin/c/PluginsController.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40961 β€Ό

CMS Made Simple <=2.2.15 is affected by SQL injection in modules/News/function.admin_articlestab.php. The $sortby variable is concatenated with $query1, but it is possible to inject arbitrary SQL language without using the '.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32272 β€Ό

OPSWAT MetaDefender Core (MDCore) before 5.1.2 has incorrect access control, resulting in privilege escalation.

πŸ“– Read

via "National Vulnerability Database".