๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2023-31926 โ€ผ

System files could be overwritten using the less command in Brocade Fabric OS before Brocade Fabric OS v9.1.1c and v9.2.0.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2022-2416 โ€ผ

In affected versions of Octopus Deploy it is possible for a low privileged guest user to craft a request that allows enumeration/recon of an environment.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-3401 โ€ผ

An issue has been discovered in GitLab affecting all versions before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-4016 โ€ผ

Under some circumstances, this weakness allows a user who has access to run the รขโ‚ฌล“psรขโ‚ฌ๏ฟฝ utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-4011 โ€ผ

An issue has been discovered in GitLab EE affecting all versions from 15.11 prior to 16.2.2 which allows an attacker to spike the resource consumption resulting in DoS.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-4067 โ€ผ

The Bus Ticket Booking with Seat Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab_date' and 'tab_date_r' parameters in versions up to, and including, 5.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-2022 โ€ผ

An issue has been discovered in GitLab CE/EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don't have access to merge

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38556 โ€ผ

Improper input validation vulnerability in SEIKO EPSON printer Web Config allows a remote attacker to turned off the printer.[Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers via a web browser. Web Config is pre-installed in some printers provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-3426 โ€ผ

The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Unified XDR and SIEM Alleviate Security Alert Fatigue ๐Ÿ•ด

By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Utilities Face Security Challenges as They Embrace Data in New Ways ๐Ÿ•ด

A culture of cybersecurity and implementing industry best practices can go a long way toward protecting a utility.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2023-26439 โ€ผ

The cacheservice API could be abused to inject parameters with SQL syntax which was insufficiently sanitized before getting executed as SQL statement. Attackers with access to a local or restricted network were able to perform arbitrary SQL queries, discovering other users cached data. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26441 โ€ผ

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26450 โ€ผ

The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26430 โ€ผ

Attackers with access to user accounts can inject arbitrary control characters to SIEVE mail-filter rules. This could be abused to access SIEVE extension that are not allowed by App Suite or to inject rules which would break per-user filter processing, requiring manual cleanup of such rules. We have added sanitization to all mail-filter APIs to avoid forwardning control characters to subsystems. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26448 โ€ผ

Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26445 โ€ผ

Frontend themes are defined by user-controllable jslob settings and could point to a malicious resource which gets processed during login. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the theme value and use a default fallback if no theme matches. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26440 โ€ผ

The cacheservice API could be abused to indirectly inject parameters with SQL syntax which was insufficiently sanitized and would later be executed when creating new cache groups. Attackers with access to a local or restricted network could perform arbitrary SQL queries. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26438 โ€ผ

External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS cache expiry correctly were able to inject configuration that would bypass existing network deny-lists. Attackers could exploit this weakness to discover the existence of restricted network infrastructure and service availability. Improvements were made to include deny-lists not only during the check of the provided connection data, but also during use. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26447 โ€ผ

The "upsell" widget for the portal allows to specify a product description. This description taken from a user-controllable jslob did not get escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26446 โ€ผ

The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".