πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-44163 β€Ό

The 'search' parameter of the process_search.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44174 β€Ό

Online Movie Ticket Booking System v1.0 is vulnerable toan authenticated Stored Cross-Site Scripting vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43014 β€Ό

Asset Management System v1.0 is vulnerable toan Authenticated SQL Injection vulnerabilityon the 'first_name' and 'last_name' parametersof user.php page, allowing an authenticatedattacker to dump all the contents of the databasecontents.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44164 β€Ό

The 'Email' parameter of the process_login.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43654 β€Ό

TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43739 β€Ό

The 'bookisbn' parameter of the cart.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44168 β€Ό

The 'phone' parameter of the process_registration.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43662 β€Ό

ShokoServer is a media server which specializes in organizing anime. In affected versions the `/api/Image/WithPath` endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter `serverImagePath`, which is not sanitized in any way before being passed to `System.IO.File.OpenRead`, which results in an arbitrary file read. This issue may lead to an arbitrary file read which is exacerbated in the windows installer which installs the ShokoServer as administrator. Any unauthenticated attacker may be able to access sensitive information and read files stored on the server. The `/api/Image/WithPath` endpoint has been removed in commit `6c57ba0f0` which will be included in subsequent releases. Users should limit access to the `/api/Image/WithPath` endpoint or manually patch their installations until a patched release is made. This issue was discovered by the GitHub Security lab and is also indexed as GHSL-2023-191.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44165 β€Ό

The 'Password' parameter of the process_login.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44166 β€Ό

The 'age' parameter of the process_registration.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44167 β€Ό

The 'name' parameter of the process_registration.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4532 β€Ό

An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI/CD jobs of private projects which they are not a member of.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2233 β€Ό

An improper authorization issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.2.8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4 before 16.4.1. It allows a project reporter to leak the owner's Sentry instance projects.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-3906 β€Ό

An input validation issue in the asset proxy in GitLab EE, affecting all versions from 12.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1, allowed an authenticated attacker to craft image urls which bypass the asset proxy.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44464 β€Ό

pretix before 2023.7.2 allows Pillow to parse EPS files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3922 β€Ό

An issue has been discovered in GitLab affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0989 β€Ό

An information disclosure issue in GitLab CE/EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3914 β€Ό

A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3979 β€Ό

An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge requestÒ€ℒs source branch.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5198 β€Ό

An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26147 β€Ό

All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".