โผ CVE-2022-27897 โผ
๐ Read
via "National Vulnerability Database".
Palantir Gotham versions prior to 3.22.11.2 included an unauthenticated endpoint that would load portions of maliciously crafted zip files to memory. An attacker could repeatedly upload a malicious zip file, which would allow them to exhaust memory resources on the dispatch server.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-23926 โผ
๐ Read
via "National Vulnerability Database".
APOC (Awesome Procedures on Cypher) is an add-on library for Neo4j. An XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin prior to version 5.5.0 in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this. External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application. Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML. The minimum version containing a patch for this vulnerability is 5.5.0. Those who cannot upgrade the library can control the allowlist of the procedures that can be used in your system.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-22580 โผ
๐ Read
via "National Vulnerability Database".
Due to improper input filtering in the sequalize js library, can malicious queries lead to sensitive information disclosure.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-22579 โผ
๐ Read
via "National Vulnerability Database".
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-25173 โผ
๐ Read
via "National Vulnerability Database".
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.๐ Read
via "National Vulnerability Database".
โ S3 Ep122: Stop calling every breach โsophisticatedโ! [Audio + Text] โ
๐ Read
via "Naked Security".
Latest episode - listen now! (Full transcript inside.)๐ Read
via "Naked Security".
Naked Security
S3 Ep122: Stop calling every breach โsophisticatedโ! [Audio + Text]
Latest episode โ listen now! (Full transcript inside.)
๐1
โผ CVE-2023-23947 โผ
๐ Read
via "National Vulnerability Database".
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All Argo CD versions starting with 2.3.0-rc1 and prior to 2.3.17, 2.4.23 2.5.11, and 2.6.2 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret. The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters). A patch for this vulnerability has been released in Argo CD versions 2.6.2, 2.5.11, 2.4.23, and 2.3.17. Two workarounds are available. Either modify the RBAC configuration to completely revoke all `clusters, update` access, or use the `destinations` and `clusterResourceWhitelist` fields to apply similar restrictions as the `namespaces` and `clusterResources` fields.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-24485 โผ
๐ Read
via "National Vulnerability Database".
Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-24483 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-23936 โผ
๐ Read
via "National Vulnerability Database".
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-23752 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-24484 โผ
๐ Read
via "National Vulnerability Database".
A malicious user can cause log files to be written to a directory that they do not have permission to write to.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-24807 โผ
๐ Read
via "National Vulnerability Database".
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.๐ Read
via "National Vulnerability Database".
๐ด Cybersecurity Jobs Remain Secure Despite Recession Fears ๐ด
๐ Read
via "Dark Reading".
Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets.๐ Read
via "Dark Reading".
Dark Reading
Cybersecurity Jobs Remain Secure Despite Recession Fears
Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets.
๐ด WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses ๐ด
๐ Read
via "Dark Reading".
Powered by WatchGuardโs Unified Security Platformยฎ architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud.๐ Read
via "Dark Reading".
Dark Reading
WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses
Powered by WatchGuardโs Unified Security Platformยฎ architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud.
โผ CVE-2022-30303 โผ
๐ Read
via "National Vulnerability Database".
An improper neutralization of special elements used in an os command ('OS Command Injection') [CWE-78] in FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions may allow an authenticated attacker to execute arbitrary shell code as `root` user via crafted HTTP requests.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-38378 โผ
๐ Read
via "National Vulnerability Database".
An improper privilege management vulnerability [CWE-269] in Fortinet FortiOS version 7.2.0 and before 7.0.7 and FortiProxy version 7.2.0 through 7.2.1 and before 7.0.7 allows an attacker that has access to the admin profile section (System subsection Administrator Users) to modify their own profile and upgrade their privileges to Read Write via CLI or GUI commands.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-23782 โผ
๐ Read
via "National Vulnerability Database".
A heap-based buffer overflow in Fortinet FortiWeb version 7.0.0 through 7.0.1, FortiWeb version 6.3.0 through 6.3.19, FortiWeb 6.4 all versions, FortiWeb 6.2 all versions, FortiWeb 6.1 all versions allows attacker to escalation of privilege via specifically crafted arguments to existing commands.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-30300 โผ
๐ Read
via "National Vulnerability Database".
A relative path traversal vulnerability [CWE-23] in FortiWeb 7.0.0 through 7.0.1, 6.3.6 through 6.3.18, 6.4 all versions may allow an authenticated attacker to obtain unauthorized access to files and data via specifically crafted HTTP GET requests.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-30299 โผ
๐ Read
via "National Vulnerability Database".
A path traversal vulnerability [CWE-23] in the API of FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions may allow an authenticated attacker to retrieve specific parts of files from the underlying file system via specially crafted web requests.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-26345 โผ
๐ Read
via "National Vulnerability Database".
Uncontrolled search path element in the Intel(R) oneAPI Toolkit OpenMP before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.๐ Read
via "National Vulnerability Database".