βΌ CVE-2023-1475 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
π΄ Technology Firms Delivering Much-Sought Encryption-in-Use π΄
π Read
via "Dark Reading".
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without needing to decrypt to plaintext.π Read
via "Dark Reading".
Dark Reading
Technology Firms Delivering Much-Sought Encryption-in-Use
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
π₯1
β S3 Ep 126: The price of fast fashion (and feature creep) [Audio + Text] β
π Read
via "Naked Security".
Worried about rogue apps? Unsure about the new Outlook zero-day? Clear advice in plain English... just like old times, with Duck and Chet!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π₯1
β Dangerous Android phone 0-day bugs revealed β patch or work around them now! β
π Read
via "Naked Security".
Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs semi-secret due to likely ease of exploitation.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2023-25172 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28107 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open-source discussion platform. Prior to version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches, a user logged as an administrator can request backups multiple times, which will eat up all the connections to the DB. If this is done on a site using multisite, then it can affect the whole cluster. The vulnerability is patched in version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46867 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Chasil Universal Star Rating plugin <= 2.1.0 version.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46854 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Obox Themes Launchpad Γ’β¬β Coming Soon & Maintenance Mode plugin <= 1.0.13 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0027 βΌ
π Read
via "National Vulnerability Database".
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected deviceΓ’β¬β’s Modbus TCP Server AOI information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28111 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, attackers are able to bypass Discourse's server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.π Read
via "National Vulnerability Database".
π΄ Microsoft Outlook Vulnerability Could Be 2023βs 'It' Bug π΄
π Read
via "Dark Reading".
Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means almost business user could be a victim.π Read
via "Dark Reading".
Dark Reading
Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug
Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means that almost any business user could be a victim.
π΄ Prancer Announces Integration With ChatGPT for Enhanced Security Assessments π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Prancer Announces Integration With ChatGPT for Enhanced Security Assessments
SAN DIEGO, Calif., March 17, 2023 /PRNewswire-PRWeb/ -- We are thrilled to announce that Prancer, a leading cloud security solution provider, has integrated its SOC2 Type II certified cloud security solution with ChatGPT, a highly advanced language modelβ¦
βΌ CVE-2023-28112 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.π Read
via "National Vulnerability Database".
π1
π΄ Microsoft Azure Warns on Killnet's Growing DDoS Onslaught Against Healthcare π΄
π Read
via "Dark Reading".
DDoS cyberattack campaigns from the pro-Russian group have spiked significantly.π Read
via "Dark Reading".
Dark Reading
Microsoft Azure Warns on Killnet's Growing DDoS Onslaught Against Healthcare
DDoS cyberattack campaigns from the pro-Russian group have spiked significantly.
π1
βΌ CVE-2023-27594 βΌ
π Read
via "National Vulnerability Database".
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, under specific conditions, Cilium may misattribute the source IP address of traffic to a cluster, identifying external traffic as coming from the host on which Cilium is running. As a consequence, network policies for that cluster might be bypassed, depending on the specific network policies enabled. This issue only manifests when Cilium is routing IPv6 traffic and NodePorts are used to route traffic to pods. IPv6 and endpoint routes are both disabled by default. The problem has been fixed and is available on versions 1.11.15, 1.12.8, and 1.13.1. As a workaround, disable IPv6 routing.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27593 βΌ
π Read
via "National Vulnerability Database".
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, an attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node. The issue has been fixed and the fix is available on versions 1.11.15, 1.12.8, and 1.13.1. Some workarounds are available. Kubernetes RBAC should be used to deny users and service accounts `exec` access to Cilium agent pods. In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24678 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in Centralite Pearl Thermostat 0x04075010 allows attackers to cause a Denial of Service (DoS) via a crafted Zigbee message.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27592 βΌ
π Read
via "National Vulnerability Database".
Miniflux is a feed reader. Since v2.0.25, Miniflux will automatically proxy images served over HTTP to prevent mixed content errors. When an outbound request made by the Go HTTP client fails, the `html.ServerError` is returned unescaped without the expected Content Security Policy header added to valid responses. By creating an RSS feed item with the inline description containing an `<img>` tag with a `srcset` attribute pointing to an invalid URL like `http:a<script>alert(1)</script>`, we can coerce the proxy handler into an error condition where the invalid URL is returned unescaped and in full. This results in JavaScript execution on the Miniflux instance as soon as the user is convinced (e.g. by a message in the alt text) to open the broken image. An attacker can execute arbitrary JavaScript in the context of a victim Miniflux user when they open a broken image in a crafted RSS feed. This can be used to perform actions on the Miniflux instance as that user and gain administrative access to the Miniflux instance if it is reachable and the victim is an administrator. A patch is available in version 2.0.43. As a workaround sisable image proxy; default value is `http-only`.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27591 βΌ
π Read
via "National Vulnerability Database".
Miniflux is a feed reader. Prior to version 2.0.43, an unauthenticated user can retrieve Prometheus metrics from a publicly reachable Miniflux instance where the `METRICS_COLLECTOR` configuration option is enabled and `METRICS_ALLOWED_NETWORKS` is set to `127.0.0.1/8` (the default). A patch is available in Miniflux 2.0.43. As a workaround, set `METRICS_COLLECTOR` to `false` (default) or run Miniflux behind a trusted reverse-proxy.π Read
via "National Vulnerability Database".
π΄ How CISOs Can Work With the CFO to Get the Best Security Budget π΄
π Read
via "Dark Reading".
CISOs can and should push back when they're presented with budget costs that affect the business. Here's how.π Read
via "Dark Reading".
Dark Reading
How CISOs Can Work With the CFO to Get the Best Security Budget
CISOs can and should push back when they're presented with budget costs that affect the business. Here's how.
βοΈ Feds Charge NY Man as BreachForums Boss βPompompurinβ βοΈ
π Read
via "Krebs on Security".
The U.S. Federal Bureau of Investigation (FBI) this week arrested a New York man on suspicion of running BreachForums, a popular English-language cybercrime forum where some of the world biggest hacked databases routinely first show up for sale. The forum's administrator "Pompompurin" has been a thorn in the side of the FBI for years, and BreachForums is widely considered a reincarnation of RaidForums, a remarkably similar crime forum that the FBI infiltrated and dismantled in 2022.π Read
via "Krebs on Security".
Krebs on Security
NY Man Charged as 'Pompompurin,' the Boss of BreachForums
The U.S. Federal Bureau of Investigation (FBI) this week arrested a New York man on suspicion of running BreachForums, a popular English-language cybercrime forum where some of the world biggest hacked databases routinely first show up for sale. The forum'sβ¦