101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

508
active users

#patchmanagement

1 post1 participant0 posts today

Hear yea, hear yea!

I’ll be hosting the Qualys Cyber Risk Series on Wed, July 31, “To Be, Or Not to Be? Patch Is the Question”.

Join me and a whole host of industry experts as we chat about proactive, risk-based remediation, and how to balance operational and security risk.

Oddsbodkins! It sounds like quite the event.

Register today at qualys.brighttalk.com/?utm_sou

Critical Vulnerabilities in VMware vCenter Server

Date: June 18, 2024
CVE: CVE-2024-37079, CVE-2024-37080, CVE-2024-37081
Vulnerability Type: Buffer Overflow, Memory Corruption
CWE: [[CWE-787]], [[CWE-416]], [[CWE-125]]
Sources: SecurityWeek, Cybersecurity News, Broadcom VMware advisory

Synopsis

Multiple critical vulnerabilities in VMware vCenter Server have been identified, potentially allowing remote code execution (RCE). These issues, detailed in VMware's security advisory VMSA-2024-0012, include CVE-2023-34048, which affects the DCE/RPC protocol implementation. The DCE/RPC (Distributed Computing Environment / Remote Procedure Call) protocol is a network protocol developed by the Open Group. It enables communication between client and server applications by allowing a program to request services from a program located on another computer within a network. DCE/RPC is based on the concept of remote procedure calls (RPC), which facilitate the execution of code on a remote system as if it were local.

Issue Summary

VMware vCenter Server, a key management component for VMware environments, contains several critical vulnerabilities. If exploited, these could allow attackers to execute arbitrary code remotely. The most critical of these, CVE-2023-34048, has been rated with a CVSS score of 9.8, indicating high severity.

Technical Key Findings

The vulnerabilities primarily involve memory corruption issues such as heap overflow and use-after-free errors in the DCE/RPC protocol. These can be exploited by sending specially crafted packets to the vCenter Server, leading to remote code execution and potential system compromise.

Vulnerable Products

  • vCenter Server 8.0
  • vCenter Server 7.0
  • VMware Cloud Foundation versions 4.x and 5.x

**Response Matrix:

| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| ------------------ | ----------- | -------------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ----------------------------------------------------------------------------------------------------------------- | --------------- | ------------------------------------------------------------------------ |
| vCenter Server | 8.0 | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | 8.0 U2d | None | FAQ |
| vCenter Server | 8.0 | Any | CVE-2024-37079, CVE-2024-37080 | 9.89.8 | Critical | 8.0 U1e | None | FAQ |
| vCenter Server | 7.0 | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | 7.0 U3r | None | FAQ |

**

Impacted Product Suites that Deploy Response Matrix 3a and 3b Components:

*

| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| --------------------------------- | ----------- | -------------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ------------------------------------------------------------------------- | --------------- | ------------------------------------------------------------------------ |
| Cloud Foundation (vCenter Server) | 5.x | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | KB88287 | None | FAQ |
| Cloud Foundation (vCenter Server) | 4.x | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | KB88287 | None | FAQ |

Impact Assessment

Successful exploitation of these vulnerabilities could result in complete control over the affected systems, allowing attackers to perform any action, including data theft, service disruption, and further network compromise.

Patches or Workarounds

VMware has released patches to address these vulnerabilities. Administrators are advised to update to the fixed versions (8.0 U2d, 7.0 U3r) . There are no available workarounds.

Tags

#VMware #vCenterServer #CVE-2023-34048 #RemoteCodeExecution #PatchManagement #Cybersecurity

Cyber Security News · Multiple VMware vCenter Server Flaws Allow Remote Code ExecutionVMware has released a critical security advisory, VMSA-2024-0012, addressing multiple vulnerabilities in VMware vCenter Server, a core component of VMware vSphere and VMware Cloud Foundation products.

Cisco IMC Command Injection Vulnerability Alert

Date: April 17, 2024
CVE: CVE-2024-20356
Vulnerability Type: Command Injection
CWE: [[CWE-78]]
Sources: Cisco Security Advisory

Issue Summary

A critical vulnerability has been identified in the Cisco Integrated Management Controller (IMC) web-based management interface. This flaw allows authenticated, remote attackers with Administrator-level privileges to perform command injection attacks, potentially gaining root access to the affected systems. Cisco has acknowledged the vulnerability and provided software updates to mitigate the issue.

Technical Key findings

The vulnerability results from inadequate input validation of command strings by the web-based management interface. Attackers can exploit this by sending specially crafted commands to the interface, which are then executed with elevated privileges.

Vulnerable products

  • 5000 Series Enterprise Network Compute Systems (ENCS)
  • Catalyst 8300 Series Edge uCPE
  • UCS C-Series M5, M6, and M7 Rack Servers (standalone mode)
  • UCS E-Series Servers
  • UCS S-Series Storage Servers (standalone mode)

Impact assessment

Successful exploitation allows attackers to elevate privileges to root, leading to full system control. This can result in unauthorized access, data leakage, and potential interruption of operations.

Patches or workaround

No workarounds are available. Cisco recommends updating to the latest firmware versions provided in their security advisory to address this vulnerability.

Tags

#Cisco #CVE-2024-20356 #CommandInjection #CIMC #ITSecurity #PatchManagement

CiscoCisco Security Advisory: Cisco Integrated Management Controller Web-Based Management Interface Command Injection VulnerabilityA vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root.  This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb

New blog post

The National Vulnerability Database (the NVD) appears to be in some sort of hiatus, no longer assigning CVSS information to CVEs. They’ve posted a note:

NIST is currently working to establish a consortium to address challenges in the NVD program and develop improved tools and methods. You will temporarily see delays in analysis efforts during this transition. We apologize for the inconvenience and ask for your patience as we work to improve the NVD program.

If you want to understand what’s happening, hackread says @joshbressers first drew attention to it, and Josh has a podcast on the episode. Me, I wonder if this has to do with the 12% budget reductions at NIST. Beyond the why, many people are quite concerned, because they’ve been using CVSS scores to reduce the amount of patching work they do, generally under a label like “risk management.” (I prefer to think of it as workload management when you’re letting someone else make “risk” decisions for you. And that’s fine. We do this outsourcing in all parts of life, work and personal.)

Full post:
shostack.org/blog/the-nvd-cris

#NVD #CVSS #patchmanagement
#riskmanagement

Date: Date first reported: 20240320
CVE: CVE-2023-41724
Sources:

Issue Summary

Ivanti has patched a critical severity vulnerability in its Standalone Sentry product. An unauthenticated threat actor can execute arbitrary commands on the underlying operating system of the appliance within the same physical or logical network.could allow unauthorized command execution.

Ivanti Standalone Sentry, formerly known as MobileIron Sentry, is a standalone software component designed to manage and secure traffic between devices and back-end enterprise systems. It is a key part of Ivanti's Unified Endpoint Management (UEM) platform, functioning as an in-line gateway. The primary roles of Ivanti Standalone Sentry include managing, encrypting, and securing traffic between mobile devices and enterprise systems.

Technical Key findings

CVE-2023-41724 allows unauthenticated actors within the same network to execute arbitrary commands due to a flaw in the Standalone Sentry, which serves as a Kerberos Key Distribution Center Proxy or gatekeeper for ActiveSync-enabled servers.

| CVE | Description | CVSS | Vector |
| -------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---- | -------------------------------------------- |
| CVE-2023-41724 | An unauthenticated threat actor can execute arbitrary commands on the underlying operating system of the appliance within the same physical or logical network. | 9.6 | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |

Vulnerable products

  • Ivanti Standalone Sentry (all supported versions 9.17.0, 9.18.0, and 9.19.0, and older versions are also at risk.)
  • Ivanti Neurons for ITSM IT service management solution

Impact assessment

Successful exploitation could lead to unauthorized command execution, potentially compromising the security of ActiveSync-enabled Exchange and Sharepoint servers, as well as IT service management solutions.

Patches or workaround

Patches are available via Ivanti's standard download portal for affected products. Immediate action is recommended to mitigate risks.

Tags

#Ivanti #CVE-2023-41724 #CVE-2023-46808 #StandaloneSentry #NeuronsforITSM #CyberSecurity #PatchManagement

"🚨 Critical Security Alert: HikCentral Professional Vulnerabilities Exposed 🚨"

Hikvision's latest advisory reveals severe vulnerabilities in HikCentral Professional, identified by Michael Dubell and Abdulazeez Omar. CVE-2024-25063 and CVE-2024-25064, with CVSS scores of 7.5 and 4.3 respectively, highlight risks of unauthorized access due to insufficient server-side validation. Users are urged to upgrade to versions above V2.5.1 for enhanced security. Stay vigilant and prioritize updating to safeguard your systems! 🛡️💻🔐

CVE Summaries:

  • CVE-2024-25063: Attackers could exploit server validation flaws to access restricted URLs, compromising confidentiality.
  • CVE-2024-25064: Authenticated users could manipulate parameters to access unauthorized resources, posing a lower risk.

Source: Hikvision Security Advisory

Tags: #CyberSecurity #Hikvision #Vulnerability #CVE2024-25063 #CVE2024-25064 #ServerSecurity #InfoSec #PatchManagement 🌍🔒💡

"🚨 Autodesk AutoCAD Vulnerabilities Exposed 🚨"

Autodesk's security advisory reveals critical vulnerabilities within AutoCAD products, impacting various versions with potential for arbitrary code execution. Highlighting CVEs such as CVE-2024-0446 through CVE-2024-23137, these flaws can be exploited through maliciously crafted files, posing significant risks to confidentiality, integrity, and availability. Mitigation includes avoiding the import feature and only importing files from trusted sources. Props to Mat Powell from Trend Micro Zero Day Initiative for uncovering these vulnerabilities. Stay vigilant and update accordingly! 🛡️💻

Tags: #CyberSecurity #Vulnerability #AutoCAD #CVE #Autodesk #CodeExecution #InfoSec #PatchManagement

AUTODESK TRUST CENTER Security advisory

"🚨 Critical Vulnerabilities Alert in ConnectWise Software 🚨"

Two vulnerabilities have been identified in ConnectWise's remote desktop software, ScreenConnect, affecting versions 23.9.7 and prior. The first vulnerability (CVE-2024-1708) is a path-traversal issue allowing potential remote code execution or access to sensitive data, rated with a high severity score of 8.4.

The second (CVE-2024-1709) is an authentication bypass, considered critical with a severity score of 10.0, and is easily exploitable with existing proof-of-concept exploits. ConnectWise has issued updates for cloud-hosted instances, but self-hosted deployments need immediate patching. The exposure is global, with significant concentrations in the United States, and it's expected that cybercriminals and nation-state actors will actively exploit these vulnerabilities.

| ---- | ---- | ---- |
| CVE Number | Description | *CVSS Severity* |
| CVE-2024-1708 | ScreenConnect 23.9.7 and prior are affected by a path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. | 8.4 High |
| CVE-2024-1709 | ConnectWise ScreenConnect 23.9.7 and prior are affected by an authentication bypass using an alternate path or channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. | 10.0 Critical |

Professionals using ConnectWise must urgently patch their systems to mitigate these vulnerabilities. The discovery underscores the importance of rigorous security practices in protecting IT infrastructures.

🛡️💻🔐

Tags: #CyberSecurity #VulnerabilityAlert #ConnectWise #CVE2024_1708 #CVE2024_1709 #PatchManagement #ITSecurity #RemoteCodeExecution #PrivilegeEscalation

Source: Unit42 by Palo Alto Networks

nvd.nist.govNVD - CVE-2024-1708

"⚠️ Critical EoP Flaw in Microsoft Exchange Server ⚠️"

A Critical Elevation of Privilege (EoP) vulnerability, CVE-2024-21410, in the Microsoft Exchange Server, demands immediate attention. Rated 9.8 on the CVSSv3 scale and tagged "Exploitation More Likely," this flaw could let attackers use NTLMv2 hashes for relay or pass-the-hash attacks. Exchange Server versions up to 2019 CU14 lack NTLM Relay Protection by default. Microsoft advises enabling this protection via a provided script that can be found in Microsoft’s advisory and urges installation of the latest update as a defense measure.

While CVE-2024-21410 remains unexploited for now AFAIK, its potential risk cannot be underestimated.

Tags: #CyberSecurity #MicrosoftExchange #EoPVulnerability #CVE2024-21410 #PatchManagement #NTLMRelay #ThreatPrevention 🛡️💻🔐

Source: Microsoft Advisory

msrc.microsoft.comSecurity Update Guide - Microsoft Security Response Center

"🚨 Alert: New Exploit CVE-2024-21412 Unveiled 🚨"

An important vulnerability, CVE-2024-21412, with a CVSS score of 8.1, has been disclosed. This flaw in Internet Shortcut Files allows an unauthenticated attacker to bypass security features by sending a specially crafted file. The exploit relies on social engineering, as the attacker cannot force the user to click but must convince them to do so. This vulnerability is already being exploited in the wild, and Microsoft has released an official fix to counteract this security threat.

For a detailed breakdown of the attack vectors associated with CVE-2024-21412, visit the MITRE database to understand how this exploit works and the best practices to mitigate such risks.

Tags: #CyberSecurity #Vulnerability #CVE2024_21412 #InfoSec #PatchManagement #SocialEngineering #SecurityUpdate 🛡️🔧💡

Remember, cybersecurity is not just about the technology but also about understanding the human element. Educate your team and community on the importance of scrutinizing files before clicking, regardless of the source.

MITRE CVE-2024-21412 Summary and MS advisory

cve.mitre.orgCVE - CVE-2024-21412 The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

"🚨 #RoundCubeUnderSiege - CISA Alerts on Roundcube as a frequent attack vector. 🚨"

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of a vulnerability in the RoundCube webmail software. Attackers are leveraging this flaw to execute arbitrary code on vulnerable servers. This Medium vulnerability, identified as CVE-2023-43770 (CVSS score: 6.1), allows attackers XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior on Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 .🔐💻

Tags: #CyberSecurity #CISA #RoundCube #EmailSecurity #VulnerabilityManagement #PatchManagement #ThreatIntelligence #InfoSec

Source: Cisa.gov

"AngularJS ReDoS Vulnerability Alert - Affecting EOL angular package, versions >=1.3.0 🚨🛡️"

A newly disclosed vulnerability in AngularJS, identified as CVE-2024-21490, poses a risk to web applications by enabling Regular Expression Denial of Service (ReDoS) attacks. This flaw affects all AngularJS versions before 1.8.3, allowing attackers to cause a service disruption by crafting specific inputs that trigger excessive backtracking in regular expressions.

Developers should review their applications for vulnerable patterns and -as this package is EOL- migrate to @angular/core. Also an #PoC example of exploiting this vulnerability can be found in a live demo on StackBlitz, showing the attack's mechanics and potential impact on AngularJS applications.

Tags: #Cybersecurity #Vulnerability #AngularJS #ReDoS #PatchManagement #WebDevelopment #SecureCoding 🌍🔑💻

Source: NVD - CVE-2024-21490, Snyk - SNYK-JS-ANGULAR-6091113, StackBlitz Demo - AngularJS Vulnerability

owasp.orgRegular expression Denial of Service - ReDoS | OWASP FoundationRegular expression Denial of Service - ReDoS on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.

"🚨 2x High Alert: Ivanti's CVE-2024-21888 - Privilege Escalation Vulnerability AND CVE-2024-21893 - Server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure🚨"

A high-severity vulnerability, CVE-2024-21888, has been identified in Ivanti Connect Secure & Ivanti Policy Secure (versions 9.x, 22.x). This vulnerability permits privilege escalation, allowing a user to gain administrative privileges.

And also a high vulnerability, named CVE-2024-21893, has been discovered in Ivanti Connect Secure and Policy Secure up to versions 9.1R18/22.6R2. This vulnerability affects the SAML component and can be exploited remotely. It allows an attacker to manipulate unknown input, leading to a server-side request forgery issue. There is no publicly available exploit.

A patch has been released to address this vulnerability. Admins are advised to apply patches ASAP and consider a factory reset of devices as an extra precaution.

Tags: #CyberSecurity #VulnerabilityAlert #Ivanti #CVE202421888 #CVE2024221893 #PrivilegeEscalation #PatchManagement #InfosecCommunity #SystemAdmins 🔐💻🛡️

Source: Ivanti's Forums Tenable

forums.ivanti.comIvanti Community

"🔓 #HCLDomino Vulnerability Alert: CVE-2023-37518 - A Critical Code Injection Risk! 🎯"

🚨 Attention InfoSec community! HCL Domino's BigFix ServiceNow module has a critical vulnerability - CVE-2023-37518. This flaw allows arbitrary code injection by an authorized attacker, posing a substantial risk to system integrity and data confidentiality. 🛡️💻

The vulnerability has a medium severity rating (CVSS v3: 6.4). Attack vector involves network access, with low complexity and low privilege requirements, making it a concerning security loophole. No user interaction is needed, amplifying the risk. 🌐🔐

Stay vigilant and ensure systems are updated to mitigate this threat. For detailed insights, check Tenable and OpenCVE.

Tags: #CyberSecurity #Vulnerability #CodeInjection #CVE202337518 #BigFix #ServiceNow #InfoSec #PatchManagement 🛠️🔒

www.tenable.comCVE-2023-37518HCL BigFix ServiceNow is vulnerable to arbitrary code injection. A malicious authorized attacker could inject arbitrary code and execute within the context of the running user.

"🚨 Alert: Cisco Unity Connection XSS Vulnerability - Time to Patch! 🚨"

A recently disclosed vulnerability in Cisco Unity Connection's web-based management interface, identified as CVE-2024-20305, poses a significant XSS (Cross-Site Scripting) risk. This vulnerability allows an authenticated, remote attacker to execute arbitrary script code or access sensitive information by deceiving a user into clicking a crafted link. The vulnerability arises from inadequate validation of user-supplied input by the interface.

Cisco Unity Connection Release 14 and earlier will need to migrate to a fixed release. Cisco Unity Connection Release 15 is not vulnerable.

Cisco has taken swift action by releasing software updates to mitigate this vulnerability. Notably, there are no workarounds, emphasizing the urgency for users to update their systems.

Stay updated and secure! 🛡️

Source: Cisco Security Advisory

Tags: #CyberSecurity #XSS #Vulnerability #Cisco #PatchManagement #InfoSec #NetworkSecurity 🌍🔐💻

CiscoCisco Security Advisory: Cisco Unity Connection Cross-Site Scripting VulnerabilityA vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-xss-9TFuu5MS

"🚨 Vulnerability in Postman up until 10.22 for macOS - CVE-2024-23738 🚨"

A severe code injection vulnerability, CVE-2024-23738, affects Postman versions up to 10.22 on macOS, posing a significant threat. This flaw allows remote attackers to execute arbitrary code through specific settings (RunAsNode and enableNodeClilnspectArguments). Rated at a high CVSS v3 score of 9.8, it requires immediate attention. Postman is an API platform for building and using APIs. No current exploits or known active exploitation. Stay vigilant! 🛡️💻

Source: PRIOn and V3x0r's Github

Tags: #CVE202423738 #CyberSecurity #CodeInjection #Postman #macOS #Vulnerability #InfoSec #PatchManagement 🚀🔐

PRIOn - AI Driven Vulnerablity Analysis & PrioritizationCVE-2024-23738 - Code injection... - PRIOnAn issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments...

"🔐 Critical RCE Vulnerability in Cisco Unified Communications Products 🚨"

A significant remote code execution (RCE) vulnerability has been identified in multiple Cisco Unified Communications and Contact Center Solutions products. This vulnerability, due to improper processing of user-provided data, could enable unauthenticated attackers to execute arbitrary code with web service user privileges, potentially leading to root access on the affected device. Cisco has released software updates, as there are no workarounds for this vulnerability.

The vulnerability affects a range of Cisco products in their default configurations, including various versions of Unified Communications Manager, Unified Contact Center Enterprise, Unity Connection, and more.

For more details, check the Cisco advisory: Cisco Security Advisory

Additionally, CISA has released an alert urging users and administrators to review Cisco's advisories and apply necessary updates to affected systems.

Tags: #CiscoSecurity #RCE #VulnerabilityAlert #CyberSecurity #InfoSec #PatchManagement #CiscoUC 🛡️🌍💻

Source: Cisco Security Advisory, CISA Advisory

CiscoCisco Security Advisory: Cisco Unified Communications Products Remote Code Execution VulnerabilityA vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to the improper processing of user-provided data that is being read into memory. An attacker could exploit this vulnerability by sending a crafted message to a listening port of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the web services user. With access to the underlying operating system, the attacker could also establish root access on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm

"🚨 Critical Zero-Day in Apache OFBiz - A Gateway to Confluence Server Exploits 🚨"

SonicWall's research team has uncovered a critical zero-day vulnerability in Apache OFBiz, a widely-used open-source enterprise resource planning system. The flaw, CVE-2023-49070, enables Pre-auth remote code execution (RCE), posing a severe risk to organizations. Attackers are leveraging this to find and exploit vulnerable Confluence servers. Users of Apache OFBiz are recommended to upgrade to version 18.12.11 as soon as possible. 🎯💻🔥

This vulnerability, tagged as T1190 (Exploit Public-Facing Application) in the MITRE ATT&CK framework, allows adversaries to execute arbitrary code remotely, potentially leading to full system compromise.

Stay vigilant and patch immediately! 🛡️🚨

Sources: SonicWall Blog, BleepingComputer

Tags: #Cybersecurity #ZeroDay #ApacheOFBiz #RCE #Confluence #PatchManagement #VulnerabilityAlert #MITREATTACK #ExploitPublicFacingApplication 🌍🛡️💡

SonicWall · SonicWall Discovers Critical Apache OFBiz Zero-day -AuthBiz | SonicWallSonicWall Capture Labs Unveils Critical Authentication Bypass Vulnerability CVE-2023-51467 in Apache OfBiz, impact and patch details.

"🚨 curl Vulnerability Alert: SOCKS5 Heap Buffer Overflow 🚨"

A critical heap buffer overflow vulnerability has been identified in curl, specifically in the SOCKS5 proxy handshake. When curl is instructed to pass the hostname to the SOCKS5 proxy for resolution, a hostname exceeding 255 bytes should trigger local name resolving. However, due to a bug, a slow SOCKS5 handshake might erroneously copy an overly long hostname to the target buffer instead of just the resolved address, causing a potential overflow. 🐛💻🔥

This flaw, tagged as CVE-2023-38545, affects libcurl versions 7.69.0 to 8.3.0 and has been assigned a high severity rating. The vulnerability was introduced when the SOCKS5 handshake code transitioned from a blocking function to a non-blocking state machine. The issue has been resolved in curl version 8.4.0, and users are urged to upgrade or apply patches to mitigate risks. 🛡️🔄

Source: curl - CVE-2023-38545

Tags: #curl #Vulnerability #Cybersecurity #CVE202338545 #BufferOverflow #InfoSec #PatchManagement #CyberHygiene

👥 Credits: Reported and patched by Jay Satiro. A heartfelt thanks to Jay for enhancing the security of the digital realm!

🔗 MITRE CVE-2023-38545

🛠️ Recommendations:

  1. Upgrade: Update curl to version 8.4.0 or a newer release where the issue is fixed.
  2. Patch: If upgrading is not feasible, consider applying the provided patch to your local version of curl.
  3. Proxy Configuration: Avoid using CURLPROXY_SOCKS5_HOSTNAME proxies with curl.
  4. Environment Variables: Do not set proxy environment variables to socks5h://.
curl.securl - SOCKS5 heap buffer overflow - CVE-2023-38545