πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ The Evolution of Business Email Compromise πŸ•΄

The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.

πŸ“– Read

via "Dark Reading".
πŸ•΄ API Secrets: Where the Bearer Model Breaks Down πŸ•΄

Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24441 β€Ό

The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as Γ’β‚¬ΛœtrustedÒ€ℒ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22984 β€Ό

The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26366 β€Ό

Cross-Site Request Forgery (CSRF) in AdRotate Banner Manager Plugin <= 5.9 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38801 β€Ό

In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38803 β€Ό

Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38802 β€Ό

Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45842 β€Ό

Unauth. Race Condition vulnerability in WP ULike Plugin <= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4242 β€Ό

A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214592.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ SPHERE Receives $31M for Series B Funding From Edison Partners, Forgepoint Capital πŸ•΄

New investment will accelerate growth and expansion of SaaS identity-hygiene platform.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ How Banks Can Upgrade Security Without Affecting Client Service πŸ•΄

New protective measures work behind the scenes, with little impact on the customer experience.

πŸ“– Read

via "Dark Reading".
πŸ‘1
⚠ Serious Security: MD5 considered harmful – to the tune of $600,000 ⚠

It's not just the hashing, by the way. It's the salting and the stretching, too!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-44294 β€Ό

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/manage_service&id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4234 β€Ό

A vulnerability was found in SourceCodester Canteen Management System. It has been rated as problematic. This issue affects the function builtin_echo of the file youthappam/brand.php. The manipulation of the argument brand_name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214595.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44151 β€Ό

Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44296 β€Ό

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/quotes/manage_remark.php?id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44295 β€Ό

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/orders/assign_team.php?id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46149 β€Ό

Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to out-of-bounds read due to logic error handling list-of-list. This issue may lead someone to remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type. Exfiltration of memory is possible if the victim performs additional certain actions on a list-of-pointer type. To be vulnerable, an application must perform a specific sequence of actions, described in the GitHub Security Advisory. The bug is present in inlined code, therefore the fix will require rebuilding dependent applications. Cap'n Proto has C++ fixes available in versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3. The `capnp` Rust crate has fixes available in versions 0.13.7, 0.14.11, and 0.15.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Clam AntiVirus Toolkit 1.0.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Suricata IDPE 6.0.9 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read

via "Packet Storm Security".