πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-1469 β€Ό

The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Γ’β‚¬Λœpec_coupon[code]Ò€ℒ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43461 β€Ό

Stored Cross-Site Scripting (XSS) vulnerability in John West Slideshow SE plugin <= 2.5.5 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45817 β€Ό

Cross-Site Scripting (XSS) vulnerability in Erin Garscadden GC Testimonials plugin <= 1.3.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45814 β€Ό

Stored Cross-Site Scripting (XSS) vulnerability in Fabian von Allmen WP Calendar plugin <= 1.5.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23622 β€Ό

Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, the count of topics displayed for a tag is a count of all regular topics regardless of whether the topic is in a read restricted category or not. As a result, any users can technically poll a sensitive tag to determine if a new topic is created in a category which the user does not have excess to. In version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, the count of topics displayed for a tag defaults to only counting regular topics which are not in read restricted categories. Staff users will continue to see a count of all topics regardless of the topic's category read restrictions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1471 β€Ό

The WP Popup Banners plugin for WordPress is vulnerable to SQL Injection via the 'banner_id' parameter in versions up to, and including, 1.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with minimal permissions, such as a subscrber, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1475 β€Ό

A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Technology Firms Delivering Much-Sought Encryption-in-Use πŸ•΄

If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without needing to decrypt to plaintext.

πŸ“– Read

via "Dark Reading".
πŸ”₯1
⚠ S3 Ep 126: The price of fast fashion (and feature creep) [Audio + Text] ⚠

Worried about rogue apps? Unsure about the new Outlook zero-day? Clear advice in plain English... just like old times, with Duck and Chet!

πŸ“– Read

via "Naked Security".
πŸ”₯1
⚠ Dangerous Android phone 0-day bugs revealed – patch or work around them now! ⚠

Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs semi-secret due to likely ease of exploitation.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-25172 β€Ό

Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28107 β€Ό

Discourse is an open-source discussion platform. Prior to version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches, a user logged as an administrator can request backups multiple times, which will eat up all the connections to the DB. If this is done on a site using multisite, then it can affect the whole cluster. The vulnerability is patched in version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46867 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Chasil Universal Star Rating plugin <= 2.1.0 version.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46854 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Obox Themes Launchpad Γ’β‚¬β€œ Coming Soon & Maintenance Mode plugin <= 1.0.13 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0027 β€Ό

Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected deviceÒ€ℒs Modbus TCP Server AOI information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28111 β€Ό

Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, attackers are able to bypass Discourse's server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Outlook Vulnerability Could Be 2023’s 'It' Bug πŸ•΄

Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means almost business user could be a victim.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-28112 β€Ό

Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ•΄ Microsoft Azure Warns on Killnet's Growing DDoS Onslaught Against Healthcare πŸ•΄

DDoS cyberattack campaigns from the pro-Russian group have spiked significantly.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2023-27594 β€Ό

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, under specific conditions, Cilium may misattribute the source IP address of traffic to a cluster, identifying external traffic as coming from the host on which Cilium is running. As a consequence, network policies for that cluster might be bypassed, depending on the specific network policies enabled. This issue only manifests when Cilium is routing IPv6 traffic and NodePorts are used to route traffic to pods. IPv6 and endpoint routes are both disabled by default. The problem has been fixed and is available on versions 1.11.15, 1.12.8, and 1.13.1. As a workaround, disable IPv6 routing.

πŸ“– Read

via "National Vulnerability Database".