πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-33293 β€Ό

An issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An attacker can make fetch requests to api-deamon to determine if a given app is installed and read the manifest.webmanifest contents, including the app version.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31066 β€Ό

Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Different users in InLong couldΓ‚ delete, edit, stop, and start others' sources!Γ‚ Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7775 https://github.com/apache/inlong/pull/7775 to solve it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33294 β€Ό

An issue was discovered in KaiOS 3.0 before 3.1. The /system/bin/tctweb_server binary exposes a local web server that responds to GET and POST requests on port 2929. The server accepts arbitrary Bash commands and executes them as root. Because it is not permission or context restricted and returns proper CORS headers, it's accessible to all websites via the browser. At a bare minimum, this allows an attacker to retrieve a list of the user's installed apps, notifications, and downloads. It also allows an attacker to delete local files and modify system properties including the boolean persist.moz.killswitch property (which would render the device inoperable). This vulnerability is partially mitigated by SELinux which prevents reads, writes, or modifications to files or permissions within protected partitions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27066 β€Ό

Directory Traversal vulnerability in Site Core Experience Platform 10.2 and earlier allows authenticated remote attackers to download arbitrary files via Urlhandle.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32350 β€Ό

Versions 00.07.00 through 00.07.03 of TeltonikaÒ€ℒs RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32348 β€Ό

TeltonikaÒ€ℒs Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31098 β€Ό

Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0.Γ‚ When users change their password to a simple password (with any character orsymbol), attackers can easily guess the user's password and access the account.Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2586 β€Ό

TeltonikaÒ€ℒs Remote Management System versions 4.14.0 is vulnerable to an unauthorized attacker registering previously unregistered devices through the RMS platform. If the user has not disabled the "RMS management feature" enabled by default, then an attacker could register that device to themselves. This could enable the attacker to perform different operations on the user's devices, including remote code execution with 'root' privileges (using the 'Task Manager' feature on RMS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31742 β€Ό

There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2588 β€Ό

TeltonikaÒ€ℒs Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devicesÒ€ℒ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31062 β€Ό

Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.Γ‚  WhenΓ‚ the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a loginrequest and following it with a subsequent HTTP requestusing the returned cookie.Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31103 β€Ό

Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.Γ‚ Attackers can change the immutable name and type of cluster of InLong.Γ‚ Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 to solve it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31101 β€Ό

Insecure Default Initialization of Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.6.0. Users registered in InLong who joined later can see deleted users' data. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32349 β€Ό

Versions 00.07.00 through 00.07.03.4 of TeltonikaÒ€ℒs RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31065 β€Ό

Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.Γ‚ An old session can be used by an attacker even after the user has been deleted or the password has been changed.Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27067 β€Ό

Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31584 β€Ό

GitHub repository cu/silicon commit a9ef36 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the User Input field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2840 β€Ό

NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2839 β€Ό

Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28467 β€Ό

In MyBB before 1.8.34, there is XSS in the User CP module via the user email field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2837 β€Ό

Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.

πŸ“– Read

via "National Vulnerability Database".