πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-39173 β€Ό

In JetBrains TeamCity before 2023.05.2 a token with limited permissions could be used to gain full account access

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39175 β€Ό

In JetBrains TeamCity before 2023.05.2 reflected XSS via GitHub integration was possible

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34369 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GrandSlambert Login Configurator plugin <=Γ‚ 2.1 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36385 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wpxpo PostX Γ’β‚¬β€œ Gutenberg Post Grid Blocks plugin <=Γ‚ 2.9.9 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37895 β€Ό

Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI.Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore.In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases.How to check whether RMI support is enabledRMI support can be over an RMI-specific TCP port, and over an HTTP binding. Both are by default enabled in Jackrabbit webapp/standalone.The native RMI protocol by default uses port 1099. To check whether it is enabled, tools like "netstat" can be used to check.RMI-over-HTTP in Jackrabbit by default uses the path "/rmi". So when running standalone on port 8080, check whether an HTTP GET request on localhost:8080/rmi returns 404 (not enabled) or 200 (enabled). Note that the HTTP path may be different when the webapp is deployed in a container as non-root context, in which case the prefix is under the user's control.Turning off RMIFind web.xml (either in JAR/WAR file or in unpacked web application folder), and remove the declaration and the mapping definition for the RemoteBindingServlet:Γ‚  Γ‚  Γ‚  Γ‚  <servlet>Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  <servlet-name>RMI</servlet-name>Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  <servlet-class>org.apache.jackrabbit.servlet.remote.RemoteBindingServlet</servlet-class>Γ‚  Γ‚  Γ‚  Γ‚  </servlet>Γ‚  Γ‚  Γ‚  Γ‚  <servlet-mapping>Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  <servlet-name>RMI</servlet-name>Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  <url-pattern>/rmi</url-pattern>Γ‚  Γ‚  Γ‚  Γ‚  </servlet-mapping>Find the bootstrap.properties file (in $REPOSITORY_HOME), and setΓ‚  Γ‚  Γ‚  Γ‚  rmi.enabled=falseΓ‚  Γ‚  and also removeΓ‚  Γ‚  Γ‚  Γ‚  rmi.hostΓ‚  Γ‚  Γ‚  Γ‚  rmi.portΓ‚  Γ‚  Γ‚  Γ‚  rmi.url-patternΓ‚ If there is no file named bootstrap.properties in $REPOSITORY_HOME, it is located somewhere in the classpath. In this case, place a copy in $REPOSITORY_HOME and modify it as explained.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36503 β€Ό

Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Max Foundry WordPress Button Plugin MaxButtons plugin <=Γ‚ 9.5.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3548 β€Ό

An unauthorized user could gain account access to IQ Wifi 6 versions prior to 2.0.2 by conducting a brute force authentication attack.

πŸ“– Read

via "National Vulnerability Database".
🦿 Get 8 Months of Live Cyber Security Training for Under $500 🦿

If you're new to cyber security or trying to improve your knowledge, Cyber Security Specialist Workshop Live Sessions provides 32 weeks of essential training for under $500.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-3773 β€Ό

A flaw was found in the Linux kernelÒ€ℒs IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3772 β€Ό

A flaw was found in the Linux kernelÒ€ℒs IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38435 β€Ό

An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Apache Felix Healthcheck Webconsole Plugin version 2.0.2 and prior may allow an attacker to perform a reflected cross-site scripting (XSS) attack.Upgrade to Apache Felix Healthcheck Webconsole Plugin 2.1.0 or higher.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46898 β€Ό

An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Path Traversal via the "restore SQL data" filename. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. The filename provided is not properly sanitized and allows for the inclusion of a path-traversal payload that can be used to escape the intended Vocera restoration directory. An attacker could exploit this vulnerability to point to a crafted ZIP archive that contains SQL commands that could be executed against the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3944 β€Ό

A vulnerability was found in phpscriptpoint Lawyer 1.6 and classified as problematic. Affected by this issue is some unknown functionality of the file page.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235400. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46901 β€Ό

An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is an Access Control Violation for Database Operations. The Vocera Report Console contains a websocket interface that allows for the unauthenticated execution of various tasks and database functions. This includes system tasks, and backing up, loading, and clearing of the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37902 β€Ό

Vyper is a Pythonic programming language that targets the Ethereum Virtual Machine (EVM). Prior to version 0.3.10, the ecrecover precompile does not fill the output buffer if the signature does not verify. However, the ecrecover builtin will still return whatever is at memory location 0. This means that the if the compiler has been convinced to write to the 0 memory location with specially crafted data (generally, this can happen with a hashmap access or immutable read) just before the ecrecover, a signature check might pass on an invalid signature. Version 0.3.10 contains a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38499 β€Ό

TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37920 β€Ό

Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35698 β€Ό

Thinkific Thinkific Online Course Creation Platform 1.0 is affected by: Cross Site Scripting (XSS). The impact is: execute arbitrary code (remote). The component is: Affected Source code of the website CMS which is been used by many to host their online courses using the Thinkific Platform. The attack vector is: To exploit the vulnerability any user has to just visit the link - https://hacktify.thinkific.com/account/billing?success=%E2%80%AA%3Cscript%3Ealert(1)%3C/script%3E. ¢¢ Thinkific is a Website based Learning Platform Product which is used by thousands of users worldwide. There is a Cross Site Scripting (XSS) based vulnerability in the code of the CMS where any attacker can execute a XSS attack. Proof of Concept & Steps to Reproduce: Step1 : Go to Google.com Step 2 : Search for this Dork site:thinkific.com -www Step 3 : You will get a list of websites which are running on the thinkific domains. Step 4 : Create account and signin in any of the website Step 5 : Add this endpoint at the end of the domain and you will see that there is a XSS Alert /account/billing?success=%E2%80%AA<script>alert(1)</script> Step 6 : Choose any domains from google for any website this exploit will work on all the websites as it is a code based flaw in the CMS Step 7 : Thousands of websites are vulnerable due to this vulnerable code in the CMS itself which is giving rise to the XSS attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37258 β€Ό

DataEase is an open source data visualization analysis tool. Prior to version 1.18.9, DataEase has a SQL injection vulnerability that can bypass blacklists. The vulnerability has been fixed in v1.18.9. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46899 β€Ό

An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Arbitrary File Upload. The BaseController class, that each of the service controllers derives from, allows for the upload of arbitrary files. If the HTTP request is a multipart/form-data POST request, any parameters with a filename entry will have their content written to a file in the Vocera upload-staging directory with the specified filename in the parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34798 β€Ό

An arbitrary file upload vulnerability in eoffice before v9.5 allows attackers to execute arbitrary code via uploading a crafted file.

πŸ“– Read

via "National Vulnerability Database".