βΌ CVE-2022-46769 βΌ
π Read
via "National Vulnerability Database".
An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.2 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in the site group feature. Upgrade to Apache Sling App CMS >= 1.1.4π Read
via "National Vulnerability Database".
βΌ CVE-2022-2196 βΌ
π Read
via "National Vulnerability Database".
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425aπ Read
via "National Vulnerability Database".
βΌ CVE-2021-4311 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The name of the patch is 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
β RSA crypto cracked? Or perhaps not! β
π Read
via "Naked Security".
Stand down from blue alert, it seems... but why not plan your cryptographic agility anyway?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π1
βοΈ Identity Thieves Bypassed Experian Security to View Credit Reports βοΈ
π Read
via "Krebs on Security".
Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer several multiple choice questions about their financial history. But until the end of 2022, Experian's website allowed anyone to bypass these questions and go straight to the consumer's report. All that was needed was the person's name, address, birthday and Social Security number.π Read
via "Krebs on Security".
Krebs on Security
Identity Thieves Bypassed Experian Security to View Credit Reports
Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer severalβ¦
π cryptmount Filesystem Manager 6.2.0 π
π Read
via "Packet Storm Security".
cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.π Read
via "Packet Storm Security".
Packetstormsecurity
cryptmount Filesystem Manager 6.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π GNUnet P2P Framework 0.19.2 π
π Read
via "Packet Storm Security".
GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.π Read
via "Packet Storm Security".
Packetstormsecurity
GNUnet P2P Framework 0.19.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π1
π tcpdump 4.99.2 π
π Read
via "Packet Storm Security".
tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.π Read
via "Packet Storm Security".
Packetstormsecurity
tcpdump 4.99.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π2
π΄ Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security π΄
π Read
via "Dark Reading".
A model of continuous authentication and identification is needed to keep consumers safe.π Read
via "Dark Reading".
Dark Reading
Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security
A model of continuous authentication and identification is needed to keep consumers safe.
β CircleCI β code-building service suffers total credential compromise β
π Read
via "Naked Security".
They're saying "rotate secrets"... in plain English, they mean "change your credentials". The company has a tool to help you find them all.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π1
βΌ CVE-2023-22472 βΌ
π Read
via "National Vulnerability Database".
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc). There are currently no known workarounds. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23509 βΌ
π Read
via "National Vulnerability Database".
Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. The communication between GitOps Run and the local S3 bucket is not encrypted. This allows privileged users or process to tap the local traffic to gain information permitting access to the s3 bucket. From that point, it would be possible to alter the bucket content, resulting in changes in the Kubernetes cluster's resources. There are no known workaround(s) for this vulnerability. This vulnerability has been fixed by commits ce2bbff and babd915. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23508 βΌ
π Read
via "National Vulnerability Database".
Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorized access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. There are no known workarounds for this issue, please upgrade. This vulnerability has been fixed by commits 75268c4 and 966823b. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works)π Read
via "National Vulnerability Database".
π΄ 7 Use Cases for Distributed Cloud Environments π΄
π Read
via "Dark Reading".
As infrastructure has grown more complex, the need to effectively manage it has grown, too β particularly for applications and APIs.π Read
via "Dark Reading".
Dark Reading
7 Use Cases for Distributed Cloud Environments
As infrastructure has grown more complex, the need to effectively manage it has grown, too β particularly for applications and APIs.
π΄ CISOs Are Focused on These 3 Trends. Are You? π΄
π Read
via "Dark Reading".
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.π Read
via "Dark Reading".
Dark Reading
CISOs Are Focused on These 3 Trends. Are You?
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
π΄ Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational Technology (OT) Cybersecurity Exposure π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational Technology (OT) Cybersecurity Exposure
Rueil-Malmaison, France & Boston β January 9, 2023 β Schneider Electric, the global leader in the digital transformation of energy management and automation, and BitSight, the leader in detecting and managing cyber risk, today announced a strategic partnershipβ¦
βΌ CVE-2023-22473 βΌ
π Read
via "National Vulnerability Database".
Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-22477 βΌ
π Read
via "National Vulnerability Database".
Mercurius is a GraphQL adapter for Fastify. Any users of Mercurius until version 10.5.0 are subjected to a denial of service attack by sending a malformed packet over WebSocket to `/graphql`. This issue was patched in #940. As a workaround, users can disable subscriptions.π Read
via "National Vulnerability Database".
π΄ JsonWebToken Security Bug Opens Servers to RCE π΄
π Read
via "Dark Reading".
The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications.π Read
via "Dark Reading".
Dark Reading
JsonWebToken Security Bug Opens Servers to RCE
The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications.
π΄ 'Copyright Infringement' Lure Used for Facebook Credential Harvesting π΄
π Read
via "Dark Reading".
Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don't appeal within 24 hours, leading victims to a credential-harvesting page instead.π Read
via "Dark Reading".
Dark Reading
'Copyright Infringement' Lure Used for Facebook Credential Harvesting
Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don't appeal within 24 hours, leading victims to a credential-harvesting page instead.
βΌ CVE-2022-46258 βΌ
π Read
via "National Vulnerability Database".
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program.π Read
via "National Vulnerability Database".