πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Without Conti On The Scene, LockBit 2.0 Leads Ransomware Attacks πŸ•΄

Analysts say an 18% drop in ransomware attacks seen in May is likely fleeting, as Conti actors regroup.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Cybersecurity Talent Shortage Is a Myth πŸ•΄

We have a tech innovation problem, not a staff retention (or recruitment) problem.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep88: Phone scammers, hacking bust, and data breach fines [Podcast + Transcript] ⚠

Latest epsiode - listen (or read) now!

πŸ“– Read

via "Naked Security".
πŸ•΄ 7 Steps to Stronger SaaS Security πŸ•΄

Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility into your SaaS security.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-32530 β€Ό

A CWE-668 Exposure of Resource to Wrong Sphere vulnerability exists that could cause users to be misled, hiding alarms, showing the wrong server connection option or the wrong control request when a mobile device has been compromised by a malicious application. Affected Product: Geo SCADA Mobile (Build 222 and prior)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41637 β€Ό

Weak access control permissions in MELAG FTP Server 2.2.0.4 allow the "Everyone" group to read the local FTP configuration file, which includes among other information the unencrypted passwords of all FTP users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41636 β€Ό

MELAG FTP Server 2.2.0.4 allows an attacker to use the CWD command to break out of the FTP servers root directory and operate on the entire operating system, while the access restrictions of the user running the FTP server apply.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41634 β€Ό

A user enumeration vulnerability in MELAG FTP Server 2.2.0.4 allows an attacker to identify valid FTP usernames.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41638 β€Ό

The authentication checks of the MELAG FTP Server in version 2.2.0.4 are incomplete, which allows a remote attacker to access local files only by using a valid username.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-41639 β€Ό

MELAG FTP Server 2.2.0.4 stores unencrpyted passwords of FTP users in a local configuration file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41635 β€Ό

When installed as Windows service MELAG FTP Server 2.2.0.4 is run as SYSTEM user, which grants remote attackers to abuse misconfigurations or vulnerabilities with administrative access over the entire host system.

πŸ“– Read

via "National Vulnerability Database".
⚠ OpenSSL issues a bugfix for the previous bugfix ⚠

Fortunately, it's not a major bugfix, which means it's easy to patch and can teach us all some useful lessons.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five 6/24 πŸ”

Read about how daycare apps may be putting your security at risk, why to double-check before ordering your COVID-19 test, the newest cybersecurity legislation signed into law, and more in this week's Friday Five!


πŸ“– Read

via "".
β€Ό CVE-2022-2104 β€Ό

The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1745 β€Ό

The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1518 β€Ό

LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1739 β€Ό

The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1668 β€Ό

Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2102 β€Ό

Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32209 β€Ό

# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: ["select", "style"] %>```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21829 β€Ό

Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing Γ’β‚¬Λœconcrete_secureÒ€ℒ instead of Γ’β‚¬ΛœconcreteÒ€ℒ. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.

πŸ“– Read

via "National Vulnerability Database".