πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-25890 β€Ό

All versions of the package wifey are vulnerable to Command Injection via the connect() function due to improper input sanitization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45126 β€Ό

Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0036 β€Ό

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0035 β€Ό

softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46769 β€Ό

An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.2 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in the site group feature. Upgrade to Apache Sling App CMS >= 1.1.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2196 β€Ό

A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4311 β€Ό

A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The name of the patch is 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
⚠ RSA crypto cracked? Or perhaps not! ⚠

Stand down from blue alert, it seems... but why not plan your cryptographic agility anyway?

πŸ“– Read

via "Naked Security".
πŸ‘1
β™ŸοΈ Identity Thieves Bypassed Experian Security to View Credit Reports β™ŸοΈ

Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer several multiple choice questions about their financial history. But until the end of 2022, Experian's website allowed anyone to bypass these questions and go straight to the consumer's report. All that was needed was the person's name, address, birthday and Social Security number.

πŸ“– Read

via "Krebs on Security".
πŸ›  cryptmount Filesystem Manager 6.2.0 πŸ› 

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

πŸ“– Read

via "Packet Storm Security".
πŸ›  GNUnet P2P Framework 0.19.2 πŸ› 

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1
πŸ›  tcpdump 4.99.2 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Read

via "Packet Storm Security".
πŸ‘2
πŸ•΄ Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security πŸ•΄

A model of continuous authentication and identification is needed to keep consumers safe.

πŸ“– Read

via "Dark Reading".
⚠ CircleCI – code-building service suffers total credential compromise ⚠

They're saying "rotate secrets"... in plain English, they mean "change your credentials". The company has a tool to help you find them all.

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2023-22472 β€Ό

Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc). There are currently no known workarounds. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23509 β€Ό

Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. The communication between GitOps Run and the local S3 bucket is not encrypted. This allows privileged users or process to tap the local traffic to gain information permitting access to the s3 bucket. From that point, it would be possible to alter the bucket content, resulting in changes in the Kubernetes cluster's resources. There are no known workaround(s) for this vulnerability. This vulnerability has been fixed by commits ce2bbff and babd915. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23508 β€Ό

Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorized access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. There are no known workarounds for this issue, please upgrade. This vulnerability has been fixed by commits 75268c4 and 966823b. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works)

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 7 Use Cases for Distributed Cloud Environments πŸ•΄

As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISOs Are Focused on These 3 Trends. Are You? πŸ•΄

The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-22473 β€Ό

Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1