πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-42449 β€Ό

Hydra is the two-layer scalability solution for Cardano. Prior to version 0.13.0, it is possible for a malicious head initializer to extract one or more PTs for the head they are initializing due to incorrect data validation logic in the head token minting policy which then results in an flawed check for burning the head ST in the `initial` validator. This is possible because it is not checked in `HeadTokens.hs` that the datums of the outputs at the `initial` validator are equal to the real head ID, and it is also not checked in the `off-chain code`.During the `Initial` state of the protocol, if the malicious initializer removes a PT from the Hydra scripts it becomes impossible for any other participant to reclaim any funds they have attempted to commit into the head, as to do so the Abort transaction must burn all the PTs for the head, but they cannot burn the PT which the attacker controls and so cannot satisfy this requirement. That means the initializer can lock the other participants committed funds forever or until they choose to return the PT (ransom).The malicious initializer can also use the PT to spoof that they have committed a particular TxO when progressing the head into the `Open` state. For example, they could say they committed a TxO residing at their address containing 100 ADA, but in fact this 100 ADA was not moved into the head, and thus in order for an other participant to perform the fanout they will be forced to pay the attacker the 100 ADA out of their own funds, as the fanout transaction must pay all the committed TxOs (even though the attacker did not really commit that TxO). They can do this by placing the PT in a UTxO with a well-formed `Commit` datum with whatever contents they like, then use this UTxO in the `collectCom` transaction. There may be other possible ways to abuse having control of a PT.Version 0.13.0 fixes this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44389 β€Ό

Zope is an open-source web application server. The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected. Patches will be released with Zope versions 4.8.11 and 5.8.6

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Trend Micro Drives Latest Phase of Channel Prosperity and Engagement πŸ•΄



πŸ“– Read

via "Dark Reading".
πŸ•΄ Nokia Selected by Brazil's K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams πŸ•΄



πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-43877 β€Ό

Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a payload crafted in the Home Page fields in the Administration menu.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35803 β€Ό

IQ Engine before 10.6r2 on Extreme Network AP devices has a Buffer Overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43321 β€Ό

File Upload vulnerability in Digital China Networks DCFW-1800-SDC v.3.0 allows an authenticated attacker to execute arbitrary code via the wget function in the /sbin/cloudadmin.sh component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40299 β€Ό

Kong Insomnia 2023.4.0 on macOS allows attackers to execute code and access restricted files, or make requests for TCC permissions, by using the DYLD_INSERT_LIBRARIES environment variable.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Insurance Companies Have a Lot to Lose in Cyberattacks πŸ•΄

Not only do insurance companies collate sensitive information from their clients, but they also generate their own corporate data to protect.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-26239 β€Ό

An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of a password check, it is possible to obtain credentials to access the management console as a non-privileged user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26236 β€Ό

An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of message handling between WatchGuard EPDR processes, it is possible to perform a Local Privilege Escalation on Windows by sending a crafted message to a named pipe.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26238 β€Ό

An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to enable or disable defensive capabilities by sending a crafted message to a named pipe.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26237 β€Ό

An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to bypass the defensive capabilities by adding a registry key as SYSTEM.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45159 β€Ό

1E Client installer can perform arbitrary file deletion on protected files.Γ‚ Γ‚ A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forcesΓ‚ the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4145 β€Ό

A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Could Cybersecurity Breaches Become Harmless in the Future? πŸ•΄

With these five steps, organizations can develop stronger security practices and make the inevitable breaches inconsequential.

πŸ“– Read

via "Dark Reading".
πŸ›  Wireshark Analyzer 4.0.10 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ›  jSQL Injection 0.94 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Critical Zero-Day Bug in Atlassian Confluence Under Active Exploit πŸ•΄

Patch now: The Atlassian security vulnerability appears to be a remotely exploitable privilege-escalation bug that cyberattackers could use to crack collaboration environments wide open.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-44390 β€Ό

HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. The vulnerability occurs in configurations where foreign content is allowed, i.e. either `svg` or `math` are in the list of allowed elements. In the case an application sanitizes user input with a vulnerable configuration, an attacker could bypass the sanitization and inject arbitrary HTML, including JavaScript code. Note that in the default configuration the vulnerability is not present. The vulnerability has been fixed in versions 8.0.723 and 8.1.722-beta (preview version).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3248 β€Ό

A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.

πŸ“– Read

via "National Vulnerability Database".