πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-38503 β€Ό

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.3.0 and prior to version 10.5.0, the permission filters (i.e. `user_created IS $CURRENT_USER`) are not properly checked when using GraphQL subscription resulting in unauthorized users getting event on their subscription which they should not be receiving according to the permissions. This can be any collection but out-of-the box the `directus_users` collection is configured with such a permissions filter allowing you to get updates for other users when changes happen. Version 10.5.0 contains a patch. As a workaround, disable GraphQL subscriptions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31457 β€Ό

RTX TRAP v1.0 allows attackers to perform a directory traversal via a crafted request sent to the endpoint /data/.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38502 β€Ό

TDengine is an open source, time-series database optimized for Internet of Things devices. Prior to version 3.0.7.1, TDengine DataBase crashes on UDF nested query. This issue affects TDengine Databases which let users connect and run arbitrary queries. Version 3.0.7.1 has a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38501 β€Ό

copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38496 β€Ό

Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.

πŸ“– Read

via "National Vulnerability Database".
⚠ Zenbleed: How the quest for CPU performance could put your passwords at risk ⚠

"You need to turn on a special setting to stop the code you wrote to stop the code you wrote to improve performance from reducing performance from reducing security."

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-32629 β€Ό

Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2640 β€Ό

On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3947 β€Ό

The Video Conferencing with Zoom plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'vczapi_encrypt_decrypt' function in versions up to, and including, 4.2.1. This makes it possible for unauthenticated attackers to decrypt and view the meeting id and password.

πŸ“– Read

via "National Vulnerability Database".
🦿 Learn How to Protect Your Business With Ultimate Security for $80 🦿

Protect your company by learning maximum security practices in this bundle, while it's available at the best-on-web price of only $79.99.

πŸ“– Read

via "Tech Republic".
❀1
πŸ“’ Cryptojacking attacks surge 399% globally as threat actors diversify tactics πŸ“’

Attackers are switching tactics to wreak havoc and maximize financial gains

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-38555 β€Ό

Authentication bypass vulnerability in Fujitsu network devices Si-R series and SR-M series allows a network-adjacent unauthenticated attacker to obtain, change, and/or reset configuration settings of the affected products. Affected products and versions are as follows: Si-R 30B all versions, Si-R 130B all versions, Si-R 90brin all versions, Si-R570B all versions, Si-R370B all versions, Si-R220D all versions, Si-R G100 V02.54 and earlier, Si-R G200 V02.54 and earlier, Si-R G100B V04.12 and earlier, Si-R G110B V04.12 and earlier, Si-R G200B V04.12 and earlier, Si-R G210 V20.52 and earlier, Si-R G211 V20.52 and earlier, Si-R G120 V20.52 and earlier, Si-R G121 V20.52 and earlier, and SR-M 50AP1 all versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32468 β€Ό

Dell ECS Streamer, versions prior to 2.0.7.1, contain an insertion of sensitive information in log files vulnerability. A remote malicious high-privileged user could potentially exploit this vulnerability leading to exposure of this sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3946 β€Ό

A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 SP1 Update 1allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2502 β€Ό

A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-5 and the CMU contains the license feature Γ’β‚¬ΛœAdvanced securityÒ€ℒ which must be ordered separately. If these preconditions are fulfilled, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a missing input data validation which eventually if exploited causes an internal buffer to overflow in the HCI IEC 60870-5-104 function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1401 β€Ό

An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4608 β€Ό

A vulnerability exists in HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-3. After session resumption interval is expired an RTU500 initiated update of session parameters causes an unexpected restart due to a stack overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38647 β€Ό

An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution.Γ‚ The code can be run in Helix REST start and Workflow creation.Affect all the versions lower and include 1.2.0.Affected products: helix-core, helix-restMitigation: Short term, stop using any YAML based configuration and workflow creation.Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Γ‚  Long term, all Helix version bumping up to 1.3.0Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38433 β€Ό

Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900?D / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-20891 β€Ό

The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs.Γ‚ A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38670 β€Ό

Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.

πŸ“– Read

via "National Vulnerability Database".