🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2022-35917

Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied `validateTransfer` function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. This issue has been patched as of version `0.2.1`. Users of the Solana Pay SDK should upgrade to it. There are no known workarounds for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2022-35918

Streamlit is a data oriented application development framework for python. Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file or overwrite existing files on the web-server. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2022-37315

graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser.

📖 Read

via "National Vulnerability Database".
CVE-2022-35920

Sanic is an opensource python web server/framework. Affected versions of sanic allow access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. Users are advised to upgrade. There is no known workaround for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2022-35922

Rust-WebSocket is a WebSocket (RFC6455) library written in Rust. In versions prior to 0.26.5 untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fails to allocate, the default Rust allocator will abort the current process, killing all threads. This affects only sync (non-Tokio) implementation. Async version also does not limit memory, but does not use `with_capacity`, so DoS can happen only when bytes for oversized dataframe or message actually got delivered by the attacker. The crashes are fixed in version 0.26.5 by imposing default dataframe size limits. Affected users are advised to update to this version. Users unable to upgrade are advised to filter websocket traffic externally or to only accept trusted traffic.

📖 Read

via "National Vulnerability Database".
CVE-2022-35921

fof/byobu is a private discussions extension for Flarum forum. Affected versions were found to not respect private discussion disablement by users. Users of Byobu should update the extension to version 1.1.7, where this has been patched. Users of Byobu with Flarum 1.0 or 1.1 should upgrade to Flarum 1.2 or later, or evaluate the impact this issue has on your forum's users and choose to disable the extension if needed. There are no workarounds for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2022-35919

MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpdate API by denying the `admin:ServerUpdate` action for your admin users via IAM policies.

📖 Read

via "National Vulnerability Database".
👍2
🕴 5 Steps to Becoming Secure by Design in the Face of Evolving Cyber Threats 🕴

From adopting zero-trust security models to dynamic environments to operating under an "assumed breach" mentality, here are ways IT departments can reduce vulnerabilities as they move deliberately to become more secure.

📖 Read

via "Dark Reading".
🕴 CREST Defensible Penetration Test Released 🕴

CREST provides commercially defensible scoping, delivery, and sign-off recommendations for penetration tests.

📖 Read

via "Dark Reading".
🕴 BlackCloak Bolsters Malware Protection With QR Code Scanner and Malicious Calendar Detection Features 🕴

In conjunction with Black Hat 2022, pioneer of digital executive protection also announces new security innovations and SOC 2 Type II certification.

📖 Read

via "Dark Reading".
🕴 Incognia Mobile App Study Reveals Low Detection of Location Spoofing in Dating Apps 🕴

With over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety.

📖 Read

via "Dark Reading".
🗓️ Trio of XSS bugs in open source web apps could lead to complete system compromise 🗓️

Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impact

📖 Read

via "The Daily Swig".
🕴 VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware 🕴

Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.

📖 Read

via "Dark Reading".
CVE-2020-28437

This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.

📖 Read

via "National Vulnerability Database".
CVE-2020-28434

This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.

📖 Read

via "National Vulnerability Database".
CVE-2020-7795

The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.

📖 Read

via "National Vulnerability Database".
CVE-2022-25867

The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.

📖 Read

via "National Vulnerability Database".
CVE-2020-28433

This affects all versions of package node-latex-pdf.

📖 Read

via "National Vulnerability Database".
CVE-2020-28451

This affects the package image-tiler before 2.0.2.

📖 Read

via "National Vulnerability Database".
CVE-2021-23385

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

📖 Read

via "National Vulnerability Database".
CVE-2022-29154

An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).

📖 Read

via "National Vulnerability Database".