πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ White House Orders Federal Agencies to Bolster Cyber Safeguards πŸ•΄

A Biden administration adviser puts federal departments and agencies on notice to come into full compliance with presidential guidelines by the end of the year.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Karma Catches Up to Global Phishing Service 16Shop β™ŸοΈ

You've probably never heard of "16Shop," but there's a good chance someone using it has tried to phish you.Last week, the international police organization INTERPOL said it had shuttered the notorious 16Shop, a popular phishing-as-a-service platform launched in 2017 that made it simple for even complete novices to conduct complex and convincing phishing scams. INTERPOL said authorities in Indonesia arrested the 21-year-old proprietor and one of his alleged facilitators, and that a third suspect was apprehended in Japan.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2023-40165 β€Ό

rubygems.org is the Ruby community's primary gem (library) hosting service. Insufficient input validation allowed malicious actors to replace any uploaded gem version that had a platform, version number, or gem name matching `/-\d/`, permanently replacing the legitimate upload in the canonical gem storage bucket, and triggering an immediate CDN purge so that the malicious gem would be served immediately. The maintainers have checked all gems matching the `/-\d/` pattern and can confirm that no unexpected `.gem`s were found. As a result, we believe this vulnerability was _not_ exploited. The easiest way to ensure that a user's applications were not exploited by this vulnerability is to check that all of your downloaded .gems have a checksum that matches the checksum recorded in the RubyGems.org database. RubyGems contributor Maciej Mensfeld wrote a tool to automatically check that all downloaded .gem files match the checksums recorded in the RubyGems.org database. You can use it by running: `bundle add bundler-integrity` followed by `bundle exec bundler-integrity`. Neither this tool nor anything else can prove you were not exploited, but the can assist your investigation by quickly comparing RubyGems API-provided checksums with the checksums of files on your disk. The issue has been patched with improved input validation and the changes are live. No action is required on the part of the user. Users are advised to validate their local gems.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39743 β€Ό

lrzip-next LZMA v23.01 was discovered to contain an access violation via the component /bz3_decode_block src/libbz3.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37914 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. Users are advised to upgrade. Users unable to upgrade may manually apply the patch on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`, but there are otherwise no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38843 β€Ό

An issue in Atlos v.1.0 allows an authenticated attacker to execute arbitrary code via a crafted payload into the description field in the incident function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38905 β€Ό

SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE, and DBMS_PIPE.RECEIVE_MESSAGE functions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39741 β€Ό

lrzip v0.651 was discovered to contain a heap overflow via the libzpaq::PostProcessor::write(int) function at /libzpaq/libzpaq.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40313 β€Ό

A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26469 β€Ό

In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Normalyze: How Focusing On Data Can Improve Cloud Security πŸ•΄

In this Dark Reading News Desk segment, Normalyze’s Ravi Ithal discusses cloud security and data security posture management (DPSM).

πŸ“– Read

via "Dark Reading".
πŸ•΄ TXOne: How to Improve Your Operational Technology Security Posture πŸ•΄

In this Dark Reading News Desk segment, Terence Liu of TXOne Networks discusses operational technology and industrial cybersecurity.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Sophos: β€˜Royal’ Is Trying to Make Itself the King of Ransomware πŸ•΄

In this Dark Reading News Desk segment, John Shier, Field CTO Commercial, Sophos, discusses the "Royal" ransomware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-31939 β€Ό

SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31938 β€Ό

SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39972 β€Ό

Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. It allows unauthorized users to create new mailing lists.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39970 β€Ό

Unrestricted Upload of File with Dangerous Type vulnerability in AcyMailing component for Joomla. It allows remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36845 β€Ό

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain, important environments variables.Utilizing a crafted request an attacker is able to modify a certain PHP environment variable leading to partial loss of integrity, which may allow chaining to other vulnerabilities.This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39973 β€Ό

Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. It allows the unauthorized removal of attachments from campaigns.

πŸ“– Read

via "National Vulnerability Database".