πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-34206 β€Ό

A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34180 β€Ό

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34188 β€Ό

Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34212 β€Ό

A missing permission check in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request to an attacker-specified URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34296 β€Ό

In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33027 β€Ό

LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33124 β€Ό

aiohttp v3.8.1 was discovered to contain an invalid IPv6 URL which can lead to a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-34210 β€Ό

A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34173 β€Ό

In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34187 β€Ό

Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34177 β€Ό

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34174 β€Ό

In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32126 β€Ό

74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34208 β€Ό

A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34170 β€Ό

In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings πŸ•΄

Johnson Controls will roll out the Tempered Networks platform across deployments of its OpenBlue AI-enabled platform.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft πŸ•΄

Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than just financial gain, security vendor says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-26863 β€Ό

Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2183 β€Ό

Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26862 β€Ό

Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26864 β€Ό

Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM.

πŸ“– Read

via "National Vulnerability Database".