πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-2648 β€Ό

A vulnerability was found in SourceCodester Multi Language Hotel Management Software. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument room_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205595.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2647 β€Ό

A vulnerability was found in jeecg-boot. It has been declared as critical. This vulnerability affects unknown code of the file /api/. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-205594 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28732 β€Ό

A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ ParseThru: HTTP parameter smuggling flaw uncovered in several Go applications πŸ—“οΈ

Harbor, Traefik, and Skipper projects tackle unsafe URL parsing methods

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-32963 β€Ό

OMICARD EDMÒ€ℒs mail file relay function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to by-pass authentication and access arbitrary system files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32965 β€Ό

OMICARD EDM has a hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code, manipulate system data and disrupt service.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-2653 β€Ό

With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35216 β€Ό

OMICARD EDMÒ€ℒs mail image relay function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to by-pass authentication and access arbitrary system files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32964 β€Ό

OMICARD EDMÒ€ℒs API function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to access, modify, delete database or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2652 β€Ό

Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ping Identity to Go Private After $2.8B Acquisition πŸ•΄

The identity-services company is being acquired by Thoma Bravo software investment for cash, before being delisted.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Deep Instinct Pioneers Deep-Learning Malware Prevention to Protect Mission-Critical Business Applications at Scale πŸ•΄

Agentless approach meets the attacker earlier to protect financial services and other large enterprises from an underserved attack vector.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Myth of Protection Online β€” and What Comes Next πŸ•΄

It's a myth that consuming and processing alerts qualifies as security. Today's technology allows better detection and prevention, rather than accepting the low bar for protection set by ingrained incident response reactions.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Chromium site isolation bypass allows wide range of attacks on browsers πŸ—“οΈ

Flaw that opened the door to cookie modification and data theft resolved

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Massive China-Linked Disinformation Campaign Taps PR Firm for Help πŸ•΄

A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Scammers Sent Uber to Take Elderly Lady to the Bank β™ŸοΈ

Email scammers sent an Uber to the home of an 80-year-old woman who responded to a well-timed email scam, in a bid to make sure she went to the bank and wired money to the fraudsters.  In this case, the woman figured out she was being scammed before embarking for the bank, but her story is a chilling reminder of how far crooks will go these days to rip people off.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2022-25168 β€Ό

Apache Hadoop's FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. "Check existence of file before untarring/zipping", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep94: This sort of crypto (graphy), and the other sort of crypto (currency!) [Audio + Text] ⚠

Lastest episode - listen now! (Or read if that's what you prefer.)

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-31118 β€Ό

Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31132 β€Ό

Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions shipped with a CSS minifier on the path `./vendor/cerdic/css-tidy/css_optimiser.php`. Access to the minifier is unrestricted and access may lead to Server-Side Request Forgery (SSRF). It is recommendet to upgrade to Mail 1.12.7 or Mail 1.13.6. Users unable to upgrade may manually delete the file located at `./vendor/cerdic/css-tidy/css_optimiser.php`

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31120 β€Ό

Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available.

πŸ“– Read

via "National Vulnerability Database".