πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-23494 β€Ό

tinymce is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user. This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements. Users are advised to upgrade to either 5.10.7 or 6.3.1. Users unable to upgrade may ensure the the `images_upload_handler` returns a valid value as per the images_upload_handler documentation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46153 β€Ό

Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23495 β€Ό

go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46158 β€Ό

PrestaShop is an open-source e-commerce solution. Versions prior to 1.7.8.8 did not properly restrict host filesystem access for users. Users may have been able to view the contents of the upload directory without appropriate permissions. This issue has been addressed and users are advised to upgrade to version 1.7.8.8. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23496 β€Ό

Yet Another UserAgent Analyzer (Yauaa) is a java library that tries to parse and analyze the useragent string and extract as many relevant attributes as possible. Applications using the Client Hints analysis feature introduced with 7.0.0 can crash because the Yauaa library throws an ArrayIndexOutOfBoundsException. If uncaught the exception will result in a program crash. Applications that do not use this feature are not affected. Users are advised to upgrade to version 7.9.0. Users unable to upgrade may catch and discard any ArrayIndexOutOfBoundsException thrown by the Yauaa library.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CNAPP Shines a Light Into Evolving Cloud Environments πŸ•΄

Cloud-native application protection platform (CNAPP) addresses security challenges in multicloud environments, including integrating applications across multicloud or hybrid cloud environments.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 3 Ways Attackers Bypass Cloud Security πŸ•΄

At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-38765 β€Ό

Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41947 β€Ό

DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Through various features of DHIS2, an authenticated user may be able to upload a file which includes embedded javascript. The user could then potentially trick another authenticated user to open the malicious file in a browser which would trigger the javascript code, resulting in a cross-site scripting (XSS) attack. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. Users unable to upgrade may add the following simple CSP rule in your web proxy to the vulnerable endpoints: `script-src 'none'`. This workaround will prevent all javascript from running on those endpoints.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41948 β€Ό

DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Affected versions are subject to a privilege escalation vulnerability. A DHIS2 user with authority to manage users can assign superuser privileges to themself by manually crafting an HTTP PUT request. Only users with the following DHIS2 user role authorities can exploit this vulnerability. Note that in many systems the only users with user admin privileges are also superusers. In these cases, the escalation vulnerability does not exist. The vulnerability is only exploitable by attackers who can authenticate as users with the user admin authority. As this is usually a small and relatively trusted set of users, exploit vectors will often be limited. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. The only known workaround to this issue is to avoid the assignment of the user management authority to any users until the patch has been applied.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ JSON syntax hack allowed SQL injection payloads to be smuggled past WAFs πŸ—“οΈ

Five vendors act to thwart generic hack

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-2752 β€Ό

A vulnerability in the web server of Secomea GateManager allows a local user to impersonate as the previous user under some failed login conditions. This issue affects: Secomea GateManager versions from 9.4 through 9.7.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google: Use SLSA Framework for Better Software Security πŸ•΄

Security leaders also need to take a more holistic approach to addressing supply chain risks, company says in new research report.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How Naming Can Change the Game in Software Supply Chain Security πŸ•΄

A reliance on CPE names currently makes accurate searching for high-risk security vulnerabilities difficult.

πŸ“– Read

via "Dark Reading".
⚠ Credit card skimming – the long and winding road of supply chain failure ⚠

Don't keep calling home to a JavaScript server that closed its doors eight years ago!

πŸ“– Read

via "Naked Security".
πŸ•΄ Iranian APT Targets US With Drokbk Spyware via GitHub πŸ•΄

The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade detection.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 43 Trillion Security Data Points Illuminate Our Most Pressing Threats πŸ•΄

A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-44213 β€Ό

ZKTeco Xiamen Information Technology ZKBio ECO ADMS <=3.1-164 is vulnerable to Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4264 β€Ό

Incorrect Privilege Assignment in M-Files Web (Classic) in M-Files before 22.8.11691.0 allows low privilege user to change some configuration.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep112: Data breaches can haunt you more than once! [Audio + Text] ⚠

Breaches, exploits, busts, buffer overflows and bug hunting - entertaining and educational in equal measure.

πŸ“– Read

via "Naked Security".
πŸ‘1πŸ”₯1
πŸ—“οΈ ChatGPT bid for bogus crypto bug bounty is thwarted πŸ—“οΈ

Improving large language models offer β€˜just one more way to attack code, and one more way to defend code’

πŸ“– Read

via "The Daily Swig".