๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2023-41945 โ€ผ

Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-41941 โ€ผ

A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-41946 โ€ผ

A cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Google's Souped-up Chrome Store Review Process Foiled by Data-Stealer ๐Ÿ•ด

Researchers have discovered that despite Google's adoption of the Manifest V3 security standard to protect against malicious plug-ins, attackers can still get bad extensions past its review process.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ‘1
๐Ÿ•ด Russia's 'Fancy Bear' APT Targets Ukrainian Energy Facility ๐Ÿ•ด

The group, best known for 2016 US election interference and other attacks on Ukraine, used phishing emails offering pictures of women to lure its victim into opening a malicious attachment.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด MinIO Attack Showcases Fresh Corporate Cloud Attack Vector ๐Ÿ•ด

The open source object storage service was the target of a never-before-seen attack on corporate cloud services, which researchers said should put DevOps in particular on notice.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2023-4498 โ€ผ

Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-36646 โ€ผ

A Cross Site Scrtpting (XSS) vulnerability in KodExplorer 4.45 allows remote attackers to run arbitrary code via /index.php page.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-20250 โ€ผ

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code with root privileges on an affected device. To exploit this vulnerability, the attacker must have valid Administrator credentials on the affected device.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses ๐Ÿ•ด

All it takes is a simple copy-paste to undo a VPN service used by millions worldwide.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2020-10130 โ€ผ

SearchBlox before Version 9.1 is vulnerable to business logic bypass where the user is able to create multiple super admin users in the system.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38484 โ€ผ

Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that couldร‚ allow an attacker to execute arbitrary code early in the bootร‚ sequence. An attacker could exploit this vulnerability toร‚ gain access to and change underlying sensitive informationร‚ in the affected controller leading to complete systemร‚ compromise.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38485 โ€ผ

Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that couldร‚ allow an attacker to execute arbitrary code early in the bootร‚ sequence. An attacker could exploit this vulnerability toร‚ gain access to and change underlying sensitive informationร‚ in the affected controller leading to complete systemร‚ compromise.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-10132 โ€ผ

SearchBlox before Version 9.1 is vulnerable to cross-origin resource sharing misconfiguration.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-41328 โ€ผ

Frappe is a low code web framework written in Python and Javascript. A SQL Injection vulnerability has been identified in the Frappe Framework which could allow a malicious actor to access sensitive information. This issue has been addressed in versions 13.46.1 and 14.20.0. Users are advised to upgrade. There's no workaround to fix this without upgrading.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-20263 โ€ผ

A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38486 โ€ผ

A vulnerability in the secure boot implementation on affectedร‚ Aruba 9200 and 9000 Series Controllers and Gateways allowsร‚ an attacker to bypass security controls which would normallyร‚ prohibit unsigned kernel images from executing. An attackerร‚ can use this vulnerability to execute arbitrary runtimeร‚ operating systems, including unverified and unsigned OSร‚ images.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-0925 โ€ผ

Version 10.11 of webMethods OneData runs an embedded instance of Azul Zulu Java 11.0.15 which hosts a Java RMI registry (listening on TCP port 2099 by default) and two RMI interfaces (listening on a single, dynamically assigned TCP high port).Port 2099 serves as a Java Remote Method Invocation (RMI) registry which allows for remotely loading and processing data via RMI interfaces. An unauthenticated attacker with network connectivity to the RMI registry and RMI interface ports can abuse this functionality to instruct the webMethods OneData application to load a malicious serialized Java object as a parameter to one of the available Java methods presented by the RMI interface. Once deserialized on the vulnerable server, the malicious code runs as whichever operating system account is used to run the software, which in most cases is the local System account on Windows.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-20243 โ€ผ

A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS accounting requests. An attacker could exploit this vulnerability by sending a crafted authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). This would eventually result in the NAD sending a RADIUS accounting request packet to Cisco ISE. An attacker could also exploit this vulnerability by sending a crafted RADIUS accounting request packet to Cisco ISE directly if the RADIUS shared secret is known. A successful exploit could allow the attacker to cause the RADIUS process to unexpectedly restart, resulting in authentication or authorization timeouts and denying legitimate users access to the network or service. Clients already authenticated to the network would not be affected. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) may be required. For more information, see the Details ["#details"] section of this advisory.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-41050 โ€ผ

AccessControl provides a general security framework for use in Zope. Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-41330 โ€ผ

knplabs/knp-snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page.## IssueOn March 17th the vulnerability CVE-2023-28115 was disclosed, allowing an attacker to gain remote code execution through PHAR deserialization. Version 1.4.2 added a check `if (\strpos($filename, 'phar://') === 0)` in the `prepareOutput` function to resolve this CVE, however if the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files. To fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`. A successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8. This issue has been addressed in commit `d3b742d61a` which has been included in version 1.4.3. Users are advised to upgrade. Users unable to upgrade should ensure that only trusted users may submit data to the `AbstractGenerator->generate(...)` function.

๐Ÿ“– Read

via "National Vulnerability Database".