πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-32698 β€Ό

nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged the files (without extra config for enforcing itÒ€ℒs own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2023-27988 β€Ό

The post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.13)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device remotely.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2023-33245 β€Ό

Minecraft through 1.19 and 1.20 pre-releases before 7 (Java) allow arbitrary file overwrite, and possibly code execution, via crafted world data that contains a symlink.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0443 β€Ό

The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2972 β€Ό

Prototype Pollution in GitHub repository antfu/utils prior to 0.7.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45853 β€Ό

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33234 β€Ό

Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection.In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.Γ‚  Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Pentagon Leaks Emphasize the Need for a Trusted Workforce πŸ•΄

Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-30196 β€Ό

Prestashop salesbooster <= 1.10.4 is vulnerable to Incorrect Access Control via modules/salesbooster/downloads/download.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2650 β€Ό

Issue summary: Processing some specially crafted ASN.1 object identifiers ordata containing them may be very slow.Impact summary: Applications that use OBJ_obj2txt() directly, or use any ofthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no messagesize limit may experience notable to very long delays when processing thosemessages, which may lead to a Denial of Service.An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -most of which have no size limit. OBJ_obj2txt() may be used to translatean ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSLtype ASN1_OBJECT) to its canonical numeric text form, which are thesub-identifiers of the OBJECT IDENTIFIER in decimal form, separated byperiods.When one of the sub-identifiers in the OBJECT IDENTIFIER is very large(these are sizes that are seen as absurdly large, taking up tens or hundredsof KiBs), the translation to a decimal number in text may take a very longtime. The time complexity is O(n^2) with 'n' being the size of thesub-identifiers in bytes (*).With OpenSSL 3.0, support to fetch cryptographic algorithms using names /identifiers in string form was introduced. This includes using OBJECTIDENTIFIERs in canonical numeric text form as identifiers for fetchingalgorithms.Such OBJECT IDENTIFIERs may be received through the ASN.1 structureAlgorithmIdentifier, which is commonly used in multiple protocols to specifywhat cryptographic algorithm should be used to sign or verify, encrypt ordecrypt, or digest passed data.Applications that call OBJ_obj2txt() directly with untrusted data areaffected, with any version of OpenSSL. If the use is for the mere purposeof display, the severity is considered low.In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,CMS, CMP/CRMF or TS. It also impacts anything that processes X.509certificates, including simple things like verifying its signature.The impact on TLS is relatively low, because all versions of OpenSSL have a100KiB limit on the peer's certificate chain. Additionally, this onlyimpacts clients, or servers that have explicitly enabled clientauthentication.In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,such as X.509 certificates. This is assumed to not happen in such a waythat it would cause a Denial of Service, so these versions are considerednot affected by this issue in such a way that it would be cause for concern,and the severity is therefore considered low.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘2
β€Ό CVE-2023-2981 β€Ό

A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230213 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 9M Dental Patients Affected by LockBit Attack on MCNA πŸ•΄

The government-sponsored dental and oral healthcare provider warned its customers that a March attack exposed sensitive data, some of which was leaked online by the ransomware group.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ›  OpenSSL Toolkit 3.0.9 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Undetected Attacks Against Middle East Targets Conducted Since 2020 πŸ•΄

Targeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that's been in the wild since 2020.

πŸ“– Read

via "Dark Reading".
⚠ Serious Security: Verification is vital – examining an OAUTH login bug ⚠

What good is a popup asking for your approval if an attacker can bypass it simply by suprpessing it?

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-4240 β€Ό

Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentication Bypass.Γ‚ This issue affects OneWireless version 322.1

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-24568 β€Ό

Dell NetWorker, contains an Improper Validation of Certificate with Host Mismatch vulnerability in Rabbitmq port which could disallow replacing CA signed certificates.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23754 β€Ό

An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33656 β€Ό

A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2968 β€Ό

A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 421M Spyware Apps Downloaded Through Google Play πŸ•΄

A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.

πŸ“– Read

via "Dark Reading".