๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2022-26362 โ€ผ

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30556 โ€ผ

Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-31214 โ€ผ

A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS prctl is not activated, and the entered mount namespace is under the attacker's control. In this way, the filesystem layout can be adjusted to gain root privileges through execution of available setuid-root binaries such as su or sudo.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-2017 โ€ผ

A vulnerability was found in SourceCodester Prison Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pms/admin/visits/view_visit.php of the component Visit Handler. The manipulation of the argument id with the input 2%27and%201=2%20union%20select%201,2,3,4,5,6,7,user(),database()--+ leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Emotet Banking Trojan Resurfaces, Skating Past Email Security ๐Ÿ•ด

The malware is using spreadsheets, documents, and other types of Microsoft Office attachments in a new and improved version that is often able to bypass email gateway-security scanners.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Identity-First Security Helps Reduce and Neutralize Enterprise Threats ๐Ÿ•ด

Okta's Marc Rogers and Auth0's Jameeka Aaron join Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about remote work security.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2022-29224 โ€ผ

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can รƒยขรขโ€šยฌร…โ€œholdรƒยขรขโ€šยฌ? (prevent removal) upstream hosts obtained via service discovery until configured active health checking fails. If an attacker controls an upstream host and also controls service discovery of that host (via DNS, the EDS API, etc.), an attacker can crash Envoy by forcing removal of the host from service discovery, and then failing the gRPC health check request. This will crash Envoy via a null pointer dereference. Users are advised to upgrade to resolve this vulnerability. Users unable to upgrade may disable gRPC health checking and/or replace it with a different health checking type as a mitigation.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30898 โ€ผ

A Cross-site request forgery (CSRF) vulnerability in Cscms music portal system v4.2 allows remote attackers to change the administrator's username and password.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-24876 โ€ผ

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด DigiCert Acquires DNS Made Easy ๐Ÿ•ด

The certificate management company plans to integrate DNS services throughout its portfolio.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Prevent Breaches and Malware With Proactive Defenses ๐Ÿ•ด

Darktrace's Mike Beck joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about risk management.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Lacework Blends Artificial Intelligence and Automation to Bolster Cloud Security ๐Ÿ•ด

Lacework's Mark Nunnikhoven joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about AI and cloud security.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Noname: Proactiveness Is the Name of the Game in App Security ๐Ÿ•ด

Noname Security's Shay Levi joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about making code more secure.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Sysdig Takes a Deeper Cut at Cloud Security ๐Ÿ•ด

Sysdig's Omer Azaria joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about cloud security.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2022-29226 โ€ผ

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. Users are advised to upgrade. There is no known workaround for this issue.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30703 โ€ผ

Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an exposed dangerous method vulnerability that could allow an attacker to obtain access to leaked kernel addresses and disclose sensitive information. This vulnerability could also potentially be chained for privilege escalation.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-29228 โ€ผ

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldnรƒยขรขโ€šยฌรขโ€žยขt ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-31051 โ€ผ

semantic-release is an open source npm package for automated version management and package publishing. In affected versions secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by `encodeURI`. Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials. Users are advised to upgrade. Users unable to upgrade should ensure that secrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-30702 โ€ผ

Trend Micro Security 2022 and 2021 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure vulnerability that could allow an attacker to disclose sensitive information on an affected machine.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-31033 โ€ผ

The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-29250 โ€ผ

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to version 10.0.1 it is possible to add extra information by SQL injection on search pages. In order to exploit this vulnerability a user must be logged in.

๐Ÿ“– Read

via "National Vulnerability Database".